System
stringclasses 1
value | User
stringlengths 139
142
| Assistant
stringlengths 279
328k
|
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-2422, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-2422 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2422
- **State**: PUBLISHED
- **Published Date**: October 25, 2022 at 00:00 UTC
- **Last Updated**: March 11, 2025 at 13:41 UTC
- **Reserved Date**: July 15, 2022 at 00:00 UTC
- **Assigned By**: DIVD
### Vulnerability Description
Due to improper input validation in the Feathers js library, it is possible to perform a SQL injection attack on the back-end database, in case the feathers-sequelize package is used.
### CVSS Metrics
- **CVSS Base Score**: 10/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Feather js - Feathers-Sequalize**
Affected versions:
- 6.x (Status: affected)
### References
1. [](https://csirt.divd.nl/DIVD-2022-00020)
2. [](https://csirt.divd.nl/CVE-2022-2422)
### Credits
- Thomas Rinsma (Codean)
- Kevin Valk (Codean)
- Victor Pasman (DIVD)
- Frank Breedijk (DIVD)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-6500, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-6500 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6500
- **State**: PUBLISHED
- **Published Date**: October 26, 2015 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 07:22 UTC
- **Reserved Date**: August 17, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in ownCloud Server before 8.0.6 and 8.1.x before 8.1.1 allows remote authenticated users to list directory contents and possibly cause a denial of service (CPU consumption) via a .. (dot dot) in the dir parameter to index.php/apps/files/ajax/scan.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2015-048.txt)
2. [DSA-3373](http://www.debian.org/security/2015/dsa-3373)
3. [](https://owncloud.org/security/advisory/?id=oc-sa-2015-014)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-24167, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-24167 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-24167
- **State**: PUBLISHED
- **Published Date**: March 31, 2025 at 22:24 UTC
- **Last Updated**: April 01, 2025 at 03:59 UTC
- **Reserved Date**: January 17, 2025 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
This issue was addressed through improved state management. This issue is fixed in Safari 18.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. A download's origin may be incorrectly associated.
### Affected Products
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - Safari**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/122371)
2. [](https://support.apple.com/en-us/122373)
3. [](https://support.apple.com/en-us/122379)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-3460, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-3460 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3460
- **State**: PUBLISHED
- **Published Date**: May 20, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 10:43 UTC
- **Reserved Date**: May 13, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in the DumpToFile method in the NQMcsVarSet ActiveX control in Agent Manager in NetIQ Sentinel allows remote attackers to create arbitrary files, and consequently execute arbitrary code, via a crafted pathname.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [58635](http://secunia.com/advisories/58635)
2. [1030434](http://www.securitytracker.com/id/1030434)
3. [67487](http://www.securityfocus.com/bid/67487)
4. [](http://zerodayinitiative.com/advisories/ZDI-14-134/)
5. [](http://www.novell.com/support/kb/doc.php?id=7015183)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-16168, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-16168 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16168
- **State**: PUBLISHED
- **Published Date**: June 07, 2018 at 02:00 UTC
- **Last Updated**: September 16, 2024 at 17:08 UTC
- **Reserved Date**: October 29, 2017 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
wffserve is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**HackerOne - wffserve node module**
Affected versions:
- All versions (Status: affected)
### References
1. [](https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/wffserve)
2. [](https://nodesecurity.io/advisories/407)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-13690, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-13690 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-13690
- **State**: PUBLISHED
- **Published Date**: September 14, 2017 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 19:05 UTC
- **Reserved Date**: August 25, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The IKEv2 parser in tcpdump before 4.9.2 has a buffer over-read in print-isakmp.c, several functions.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [GLSA-201709-23](https://security.gentoo.org/glsa/201709-23)
2. [](https://support.apple.com/HT208221)
3. [DSA-3971](http://www.debian.org/security/2017/dsa-3971)
4. [1039307](http://www.securitytracker.com/id/1039307)
5. [](https://github.com/the-tcpdump-group/tcpdump/commit/8dca25d26c7ca2caf6138267f6f17111212c156e)
6. [](http://www.tcpdump.org/tcpdump-changes.txt)
7. [RHEA-2018:0705](https://access.redhat.com/errata/RHEA-2018:0705)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-46493, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-46493 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-46493
- **State**: PUBLISHED
- **Published Date**: December 08, 2023 at 00:00 UTC
- **Last Updated**: August 28, 2024 at 16:17 UTC
- **Reserved Date**: October 23, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory Traversal vulnerability in EverShop NPM versions before v.1.0.0-rc.8 allows a remote attacker to obtain sensitive information via a crafted request to the readDirSync function in fileBrowser/browser.js.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://devhub.checkmarx.com/cve-details/Cxa4d94170-be41/)
2. [](https://devhub.checkmarx.com/cve-details/CVE-2023-46493/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-9038, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-9038 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9038
- **State**: PUBLISHED
- **Published Date**: May 18, 2017 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 16:55 UTC
- **Reserved Date**: May 17, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
GNU Binutils 2.28 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file, related to the byte_get_little_endian function in elfcomm.c, the get_unwind_section_word function in readelf.c, and ARM unwind information that contains invalid word offsets.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [98589](http://www.securityfocus.com/bid/98589)
2. [GLSA-201709-02](https://security.gentoo.org/glsa/201709-02)
3. [](https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/)
4. [](https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=f32ba72991d2406b21ab17edc234a2f3fa7fb23d)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-0287, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-0287 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-0287
- **State**: PUBLISHED
- **Published Date**: January 13, 2023 at 12:40 UTC
- **Last Updated**: April 04, 2025 at 15:03 UTC
- **Reserved Date**: January 13, 2023 at 12:40 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in ityouknow favorites-web. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Comment Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-218294 is the identifier assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**ityouknow - favorites-web**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://vuldb.com/?id.218294)
2. [](https://vuldb.com/?ctiid.218294)
3. [](https://gitee.com/ityouknow/favorites-web/issues/I684L9)
### Credits
- VulDB Gitee Analyzer
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-9827, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-9827 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9827
- **State**: PUBLISHED
- **Published Date**: July 03, 2019 at 20:13 UTC
- **Last Updated**: August 04, 2024 at 22:01 UTC
- **Reserved Date**: March 14, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Hawt Hawtio through 2.5.0 is vulnerable to SSRF, allowing a remote attacker to trigger an HTTP request from an affected server to an arbitrary host via the initial /proxy/ substring of a URI.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.ciphertechs.com/hawtio-advisory/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-37671, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-37671 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-37671
- **State**: PUBLISHED
- **Published Date**: August 12, 2021 at 21:40 UTC
- **Last Updated**: August 04, 2024 at 01:23 UTC
- **Reserved Date**: July 29, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause undefined behavior via binding a reference to null pointer in `tf.raw_ops.Map*` and `tf.raw_ops.OrderedMap*` operations. The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/map_stage_op.cc#L222-L248) has a check in place to ensure that `indices` is in ascending order, but does not check that `indices` is not empty. We have patched the issue in GitHub commit 532f5c5a547126c634fefd43bbad1dc6417678ac. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-824: Security Weakness
### Affected Products
**tensorflow - tensorflow**
Affected versions:
- >= 2.5.0, < 2.5.1 (Status: affected)
- >= 2.4.0, < 2.4.3 (Status: affected)
- < 2.3.4 (Status: affected)
### References
1. [](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qr82-2c78-4m8h)
2. [](https://github.com/tensorflow/tensorflow/commit/532f5c5a547126c634fefd43bbad1dc6417678ac)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-11282, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-11282 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-11282
- **State**: PUBLISHED
- **Published Date**: January 07, 2025 at 06:40 UTC
- **Last Updated**: January 07, 2025 at 16:55 UTC
- **Reserved Date**: November 15, 2024 at 19:53 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Passster – Password Protect Pages and Content plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.2.10 via the WordPress core search feature. This makes it possible for unauthenticated attackers to extract sensitive data from posts that have been restricted to higher-level roles such as administrator.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**wpchill - Passster – Password Protect Pages and Content**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/11782a65-30b9-400e-8fe0-ab9f05ba5e42?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset/3211004/content-protector)
### Credits
- Francesco Carlucci
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-41356, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-41356 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-41356
- **State**: PUBLISHED
- **Published Date**: November 03, 2023 at 06:18 UTC
- **Last Updated**: October 14, 2024 at 03:37 UTC
- **Reserved Date**: August 29, 2023 at 00:14 UTC
- **Assigned By**: twcert
### Vulnerability Description
NCSIST ManageEngine Mobile Device Manager(MDM) APP's special function has a path traversal vulnerability. An unauthenticated remote attacker can exploit this vulnerability to bypass authentication and read arbitrary system files.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**WisdomGarden - Tronclass ilearn**
Affected versions:
- V1.4 2021/09/14 (Status: affected)
### References
1. [](https://www.twcert.org.tw/tw/cp-132-7506-b4e29-1.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-20926, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-20926 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-20926
- **State**: PUBLISHED
- **Published Date**: January 16, 2024 at 21:41 UTC
- **Last Updated**: May 15, 2025 at 16:14 UTC
- **Reserved Date**: December 07, 2023 at 22:28 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Scripting). Supported versions that are affected are Oracle Java SE: 8u391, 8u391-perf, 11.0.21; Oracle GraalVM for JDK: 17.0.9; Oracle GraalVM Enterprise Edition: 20.3.12, 21.3.8 and 22.3.4. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Affected Products
**Oracle Corporation - Java SE JDK and JRE**
Affected versions:
- Oracle Java SE:8u391 (Status: affected)
- Oracle Java SE:8u391-perf (Status: affected)
- Oracle Java SE:11.0.21 (Status: affected)
- Oracle GraalVM for JDK:17.0.9 (Status: affected)
- Oracle GraalVM Enterprise Edition:20.3.12 (Status: affected)
- Oracle GraalVM Enterprise Edition:21.3.8 (Status: affected)
- Oracle GraalVM Enterprise Edition:22.3.4 (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpujan2024.html)
2. [](https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html)
3. [](https://security.netapp.com/advisory/ntap-20240201-0002/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2001-1050, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2001-1050 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-1050
- **State**: PUBLISHED
- **Published Date**: February 02, 2002 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 04:44 UTC
- **Reserved Date**: January 31, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
CCCSoftware CCC PHP script allows remote attackers to include arbitrary files from remote web sites via an HTTP request that sets the includedir variable.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20011002 results of semi-automatic source code audit](http://archives.neohapsis.com/archives/bugtraq/2001-10/0012.html)
2. [3389](http://www.securityfocus.com/bid/3389)
3. [php-includedir-code-execution(7215)](https://exchange.xforce.ibmcloud.com/vulnerabilities/7215)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-36963, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-36963 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-36963
- **State**: PUBLISHED
- **Published Date**: September 15, 2021 at 11:23 UTC
- **Last Updated**: August 04, 2024 at 01:09 UTC
- **Reserved Date**: July 19, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Common Log File System Driver Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36963)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-22678, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-22678 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-22678
- **State**: PUBLISHED
- **Published Date**: March 20, 2023 at 11:05 UTC
- **Last Updated**: January 10, 2025 at 19:19 UTC
- **Reserved Date**: January 06, 2023 at 12:02 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Rafael Dery Superior FAQ plugin <= 1.0.2 versions.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Rafael Dery - Superior FAQ**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/superior-faq/wordpress-superior-faq-plugin-1-0-2-cross-site-request-forgery-csrf?_s_id=cve)
### Credits
- NeginNrb (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-45474, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-45474 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-45474
- **State**: PUBLISHED
- **Published Date**: May 29, 2025 at 00:00 UTC
- **Last Updated**: May 29, 2025 at 15:54 UTC
- **Reserved Date**: April 22, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
maccms10 v2025.1000.4047 is vulnerable to Server-side request forgery (SSRF) in Email Settings.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.yuque.com/morysummer/vx41bz/ptnnp4eema601rvz)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-8735, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-8735 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-8735
- **State**: PUBLISHED
- **Published Date**: December 18, 2019 at 17:33 UTC
- **Last Updated**: August 04, 2024 at 21:24 UTC
- **Reserved Date**: February 18, 2019 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 13, iTunes for Windows 12.10.1, iCloud for Windows 10.7, iCloud for Windows 7.14. Processing maliciously crafted web content may lead to arbitrary code execution.
### Affected Products
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - iTunes for Windows**
Affected versions:
- unspecified (Status: affected)
**Apple - iCloud for Windows**
Affected versions:
- unspecified (Status: affected)
**Apple - iCloud for Windows (Legacy)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/HT210635)
2. [](https://support.apple.com/HT210636)
3. [](https://support.apple.com/HT210637)
4. [GLSA-202003-22](https://security.gentoo.org/glsa/202003-22)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-46438, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-46438 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-46438
- **State**: PUBLISHED
- **Published Date**: January 12, 2023 at 00:00 UTC
- **Last Updated**: April 08, 2025 at 14:11 UTC
- **Reserved Date**: December 05, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A cross-site scripting (XSS) vulnerability in the /admin/article_category.php component of DouPHP v1.7 20221118 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the description parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.yuque.com/ni4n/yesa2m/fem0pgtvgogay3lv)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-21634, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-21634 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-21634
- **State**: PUBLISHED
- **Published Date**: January 03, 2024 at 22:46 UTC
- **Last Updated**: August 01, 2024 at 22:27 UTC
- **Reserved Date**: December 29, 2023 at 03:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Amazon Ion is a Java implementation of the Ion data notation. Prior to version 1.10.5, a potential denial-of-service issue exists in `ion-java` for applications that use `ion-java` to deserialize Ion text encoded data, or deserialize Ion text or binary encoded data into the `IonValue` model and then invoke certain `IonValue` methods on that in-memory representation. An actor could craft Ion data that, when loaded by the affected application and/or processed using the `IonValue` model, results in a `StackOverflowError` originating from the `ion-java` library. The patch is included in `ion-java` 1.10.5. As a workaround, do not load data which originated from an untrusted source or that could have been tampered with.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-770: Security Weakness
### Affected Products
**amazon-ion - ion-java**
Affected versions:
- < 1.10.5 (Status: affected)
### References
1. [https://github.com/amazon-ion/ion-java/security/advisories/GHSA-264p-99wq-f4j6](https://github.com/amazon-ion/ion-java/security/advisories/GHSA-264p-99wq-f4j6)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-27180, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-27180 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-27180
- **State**: PUBLISHED
- **Published Date**: April 07, 2023 at 00:00 UTC
- **Last Updated**: February 12, 2025 at 17:12 UTC
- **Reserved Date**: February 27, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
GDidees CMS v3.9.1 was discovered to contain a source code disclosure vulnerability by the backup feature which is accessible via /_admin/backup.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.gdidees.eu/cms-1-0.html)
2. [](https://github.com/chamilo/pclzip)
3. [](https://gist.github.com/Hadi999/d691e35d4f494d37ccc5638e68227606)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2005-3253, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2005-3253 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3253
- **State**: PUBLISHED
- **Published Date**: December 16, 2005 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 23:01 UTC
- **Reserved Date**: October 18, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Wireless Access Points (AP) for (1) Avaya AP-3 through AP-6 2.5 to 2.5.4, and AP-7/AP-8 2.5 and other versions before 3.1, and (2) Proxim AP-600 and AP-2000 before 2.5.5, and Proxim AP-700 and AP-4000 after 2.4.11 and before 3.1, use a static WEP key of "12345", which allows remote attackers to bypass authentication.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [22091](http://www.osvdb.org/22091)
2. [18047](http://secunia.com/advisories/18047)
3. [18057](http://secunia.com/advisories/18057)
4. [ADV-2005-2931](http://www.vupen.com/english/advisories/2005/2931)
5. [](http://support.avaya.com/elmodocs2/security/ASA-2005-233.pdf)
6. [](http://keygen.proxim.com/support/cs/Documents/802.1x_vulnerability.pdf)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2011-4703, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2011-4703 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-4703
- **State**: PUBLISHED
- **Published Date**: January 25, 2012 at 02:00 UTC
- **Last Updated**: September 16, 2024 at 18:18 UTC
- **Reserved Date**: December 08, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Limit My Call (com.limited.call.view) application 2.11 for Android does not properly protect data, which allows remote attackers to read or modify call logs and a contact list via a crafted application.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2011-4703-vulnerability-in-LimitMyCall.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-23609, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-23609 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-23609
- **State**: PUBLISHED
- **Published Date**: March 11, 2024 at 15:17 UTC
- **Last Updated**: April 16, 2025 at 15:48 UTC
- **Reserved Date**: January 18, 2024 at 20:48 UTC
- **Assigned By**: NI
### Vulnerability Description
An improper error handling vulnerability in LabVIEW may result in remote code execution. Successful exploitation requires an attacker to provide a user with a specially crafted VI. This vulnerability affects LabVIEW 2024 Q1 and prior versions.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-1285: Security Weakness
### Affected Products
**NI - LabVIEW**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/improper-error-handling-issues-in-labview.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-39135, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-39135 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-39135
- **State**: PUBLISHED
- **Published Date**: September 11, 2022 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 11:10 UTC
- **Reserved Date**: September 01, 2022 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
Apache Calcite 1.22.0 introduced the SQL operators EXISTS_NODE, EXTRACT_XML, XML_TRANSFORM and EXTRACT_VALUE do not restrict XML External Entity references in their configuration, making them vulnerable to a potential XML External Entity (XXE) attack. Therefore any client exposing these operators, typically by using Oracle dialect (the first three) or MySQL dialect (the last one), is affected by this vulnerability (the extent of it will depend on the user under which the application is running). From Apache Calcite 1.32.0 onwards, Document Type Declarations and XML External Entity resolution are disabled on the impacted operators.
### Weakness Classification (CWE)
- CWE-611: Security Weakness
### Affected Products
**Apache Software Foundation - Apache Calcite**
Affected versions:
- 1.22.0 (Status: affected)
### References
1. [](https://lists.apache.org/thread/ohdnhlgm6jvt3srw8l7spkm2d5vwm082)
2. [[oss-security] 20221121 Apache Solr is vulnerable to CVE-2022-39135 via /sql handler](http://www.openwall.com/lists/oss-security/2022/11/21/3)
### Credits
- Apache Calcite would like to thank David Handermann for reporting this issue
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2010-1663, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2010-1663 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1663
- **State**: PUBLISHED
- **Published Date**: April 30, 2010 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 01:28 UTC
- **Reserved Date**: April 30, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Google URL Parsing Library (aka google-url or GURL) in Google Chrome before 4.1.249.1064 allows remote attackers to bypass the Same Origin Policy via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [39651](http://secunia.com/advisories/39651)
2. [](http://googlechromereleases.blogspot.com/2010/04/stable-update-bug-and-security-fixes.html)
3. [](http://bugs.chromium.org/40445)
4. [oval:org.mitre.oval:def:6813](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6813)
5. [ADV-2010-1016](http://www.vupen.com/english/advisories/2010/1016)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2005-4596, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2005-4596 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-4596
- **State**: PUBLISHED
- **Published Date**: January 01, 2006 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 23:53 UTC
- **Reserved Date**: January 01, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in read.php in AdesGuestbook 2.0 allows remote attackers to inject arbitrary web script or HTML via the totalRows_rsRead parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [22111](http://www.osvdb.org/22111)
2. [18244](http://secunia.com/advisories/18244)
3. [](http://pridels0.blogspot.com/2005/12/adesguestbook-xss-vuln.html)
4. [16090](http://www.securityfocus.com/bid/16090)
5. [adesguestbook-read-xss(23909)](https://exchange.xforce.ibmcloud.com/vulnerabilities/23909)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-20645, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-20645 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-20645
- **State**: PUBLISHED
- **Published Date**: March 07, 2023 at 00:00 UTC
- **Last Updated**: March 05, 2025 at 20:09 UTC
- **Reserved Date**: October 28, 2022 at 00:00 UTC
- **Assigned By**: MediaTek
### Vulnerability Description
In ril, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628609; Issue ID: ALPS07628609.
### Affected Products
**MediaTek, Inc. - MT6739, MT6761, MT6762, MT6763, MT6765, MT6769, MT6771, MT6779, MT6785, MT6789, MT6873, MT6875, MT6877, MT6879, MT6895, MT6983, MT8791, MT8791T, MT8797**
Affected versions:
- Android 12.0, 13.0 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/March-2023)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-47449, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-47449 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-47449
- **State**: PUBLISHED
- **Published Date**: May 07, 2025 at 14:19 UTC
- **Last Updated**: May 07, 2025 at 18:22 UTC
- **Reserved Date**: May 07, 2025 at 09:38 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jordy Meow Meow Gallery allows Stored XSS. This issue affects Meow Gallery: from n/a through 5.2.7.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Jordy Meow - Meow Gallery**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/meow-gallery/vulnerability/wordpress-meow-gallery-5-2-7-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- R4mbb (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-12982, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-12982 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-12982
- **State**: PUBLISHED
- **Published Date**: August 21, 2017 at 07:00 UTC
- **Last Updated**: August 05, 2024 at 18:51 UTC
- **Reserved Date**: August 21, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The bmp_read_info_header function in bin/jp2/convertbmp.c in OpenJPEG 2.2.0 does not reject headers with a zero biBitCount, which allows remote attackers to cause a denial of service (memory allocation failure) in the opj_image_create function in lib/openjp2/image.c, related to the opj_aligned_alloc_n function in opj_malloc.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/uclouvain/openjpeg/commit/baf0c1ad4572daa89caa3b12985bdd93530f0dd7)
2. [GLSA-201710-26](https://security.gentoo.org/glsa/201710-26)
3. [](https://blogs.gentoo.org/ago/2017/08/14/openjpeg-memory-allocation-failure-in-opj_aligned_alloc_n-opj_malloc-c/)
4. [](https://github.com/uclouvain/openjpeg/issues/983)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-9192, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-9192 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9192
- **State**: PUBLISHED
- **Published Date**: May 23, 2017 at 03:56 UTC
- **Last Updated**: August 05, 2024 at 16:55 UTC
- **Reserved Date**: May 22, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
libautotrace.a in AutoTrace 0.31.1 has a heap-based buffer overflow in the ReadImage function in input-tga.c:528:7.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-46539, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-46539 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-46539
- **State**: PUBLISHED
- **Published Date**: October 25, 2023 at 00:00 UTC
- **Last Updated**: September 11, 2024 at 15:24 UTC
- **Reserved Date**: October 23, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discovered to contain a stack overflow via the function registerRequestHandle.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://resource.tp-link.com.cn/pc/docCenter/showDoc?id=1676623713687165)
2. [](https://github.com/XYIYM/Digging/blob/main/TP-LINK/TL-WR886N/8/1.md)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-6232, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-6232 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6232
- **State**: PUBLISHED
- **Published Date**: September 11, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 12:10 UTC
- **Reserved Date**: September 04, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in the LDAP (eu_ldap) extension before 2.8.18 for TYPO3 allows remote authenticated users to obtain sensitive information via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://typo3.org/extensions/repository/view/eu_ldap)
2. [60886](http://secunia.com/advisories/60886)
3. [](http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-010)
4. [69565](http://www.securityfocus.com/bid/69565)
5. [euldap-unspecified-info-disc(95701)](https://exchange.xforce.ibmcloud.com/vulnerabilities/95701)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-2310, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-2310 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2310
- **State**: PUBLISHED
- **Published Date**: May 10, 2023 at 19:18 UTC
- **Last Updated**: January 27, 2025 at 18:20 UTC
- **Reserved Date**: April 26, 2023 at 18:25 UTC
- **Assigned By**: SEL
### Vulnerability Description
A Channel Accessible by Non-Endpoint vulnerability in the Schweitzer Engineering Laboratories SEL Real-Time Automation Controller (RTAC) could allow a remote attacker to perform a man-in-the-middle (MiTM) that could result in denial of service.
See the ACSELERATOR RTAC SEL-5033 Software instruction manual date code 20210915 for more details.
### CVSS Metrics
- **CVSS Base Score**: 6.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H`
### Weakness Classification (CWE)
- CWE-300: Security Weakness
### Affected Products
**Schweitzer Engineering Laboratories - SEL-3505**
Affected versions:
- R119-V0 (Status: affected)
- R119-V0 (Status: affected)
- R119-V0 (Status: affected)
- R119-V0 (Status: affected)
**Schweitzer Engineering Laboratories, Inc. - SEL-3505-3**
Affected versions:
- R132-V0 (Status: affected)
- R132-V0 (Status: affected)
- R132-V0 (Status: affected)
- R132-V0 (Status: affected)
**Schweitzer Engineering Laboratories - SEL-3530**
Affected versions:
- R100-V0 (Status: affected)
- R100-V0 (Status: affected)
- R100-V0 (Status: affected)
- R100-V0 (Status: affected)
**Schweitzer Engineering Laboratories, Inc. - SEL-3530-4**
Affected versions:
- R108-V0 (Status: affected)
- R108-V0 (Status: affected)
- R108-V0 (Status: affected)
- R108-V0 (Status: affected)
**Schweitzer Engineering Laboratories, Inc. - SEL-3532**
Affected versions:
- R132-V0 (Status: affected)
- R132-V0 (Status: affected)
- R132-V0 (Status: affected)
- R132-V0 (Status: affected)
**Schweitzer Engineering Laboratories, Inc. - SEL-3555**
Affected versions:
- R134-V0 (Status: affected)
- R134-V0 (Status: affected)
- R134-V0 (Status: affected)
- R134-V0 (Status: affected)
**Schweitzer Engineering Laboratories, Inc. - SEL-3560S**
Affected versions:
- R144-V2 (Status: affected)
- R144-V2 (Status: affected)
- R144-V2 (Status: affected)
- R144-V2 (Status: affected)
**Schweitzer Engineering Laboratories, Inc. - SEL-3560E**
Affected versions:
- R144-V2 (Status: affected)
- R144-V2 (Status: affected)
- R144-V2 (Status: affected)
- R144-V2 (Status: affected)
**Schweitzer Engineering Laboratories, Inc. - SEL-2241 RTAC module**
Affected versions:
- R113-V0 (Status: affected)
- R113-V0 (Status: affected)
- R113-V0 (Status: affected)
- R113-V0 (Status: affected)
**Schweitzer Engineering Laboratories, Inc. - SEL-3350**
Affected versions:
- R148-V0 (Status: affected)
- R148-V0 (Status: affected)
- R148-V0 (Status: affected)
### References
1. [](https://selinc.com/support/security-notifications/external-reports/)
### Credits
- Adeen Ayub, Syed Ali Qasim, Irfan Ahmed, Virginia Commonwealth University
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-21735, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-21735 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-21735
- **State**: PUBLISHED
- **Published Date**: February 27, 2025 at 02:12 UTC
- **Last Updated**: May 04, 2025 at 07:20 UTC
- **Reserved Date**: December 29, 2024 at 08:45 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
NFC: nci: Add bounds checking in nci_hci_create_pipe()
The "pipe" variable is a u8 which comes from the network. If it's more
than 127, then it results in memory corruption in the caller,
nci_hci_connect_gate().
### Affected Products
**Linux - Linux**
Affected versions:
- a1b0b9415817c14d207921582f269d03f848b69f (Status: affected)
- a1b0b9415817c14d207921582f269d03f848b69f (Status: affected)
- a1b0b9415817c14d207921582f269d03f848b69f (Status: affected)
- a1b0b9415817c14d207921582f269d03f848b69f (Status: affected)
- a1b0b9415817c14d207921582f269d03f848b69f (Status: affected)
- a1b0b9415817c14d207921582f269d03f848b69f (Status: affected)
- a1b0b9415817c14d207921582f269d03f848b69f (Status: affected)
- a1b0b9415817c14d207921582f269d03f848b69f (Status: affected)
**Linux - Linux**
Affected versions:
- 4.4 (Status: affected)
- 0 (Status: unaffected)
- 5.4.291 (Status: unaffected)
- 5.10.235 (Status: unaffected)
- 5.15.179 (Status: unaffected)
- 6.1.129 (Status: unaffected)
- 6.6.78 (Status: unaffected)
- 6.12.14 (Status: unaffected)
- 6.13.3 (Status: unaffected)
- 6.14 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/bd249109d266f1d52548c46634a15b71656e0d44)
2. [](https://git.kernel.org/stable/c/674e17c5933779a8bf5c15d596fdfcb5ccdebbc2)
3. [](https://git.kernel.org/stable/c/10b3f947b609713e04022101f492d288a014ddfa)
4. [](https://git.kernel.org/stable/c/d5a461c315e5ff92657f84d8ba50caa5abf5c22a)
5. [](https://git.kernel.org/stable/c/172cdfc3a5ea20289c58fb73dadc6fd4a8784a4e)
6. [](https://git.kernel.org/stable/c/2ae4bade5a64d126bd18eb66bd419005c5550218)
7. [](https://git.kernel.org/stable/c/59c7ed20217c0939862fbf8145bc49d5b3a13f4f)
8. [](https://git.kernel.org/stable/c/110b43ef05342d5a11284cc8b21582b698b4ef1c)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-27081, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-27081 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-27081
- **State**: PUBLISHED
- **Published Date**: March 23, 2022 at 23:25 UTC
- **Last Updated**: August 03, 2024 at 05:18 UTC
- **Reserved Date**: March 14, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tenda M3 1.10 V1.0.0.12(4856) was discovered to contain a command injection vulnerability via the component /goform/SetLanInfo.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/GD008/vuln/blob/main/tenda_M3_SetLanInfo/M3_SetLanInfo.md)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-3352, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-3352 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-3352
- **State**: PUBLISHED
- **Published Date**: April 21, 2015 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 05:47 UTC
- **Reserved Date**: April 21, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site request forgery (CSRF) vulnerabilities in the Jammer module before 6.x-1.8 and 7.x-1.x before 7.x-1.4 for Drupal allow remote attackers to hijack the authentication of administrators for requests that delete a setting for (1) hidden form elements or (2) status messages via unspecified vectors, related to "report administration."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.drupal.org/node/2403487)
2. [71958](http://www.securityfocus.com/bid/71958)
3. [](https://www.drupal.org/node/2402745)
4. [[oss-security] 20150129 Re: CVEs for Drupal contributed modules - January 2015](http://www.openwall.com/lists/oss-security/2015/01/29/6)
5. [](https://www.drupal.org/node/2402749)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-38045, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-38045 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-38045
- **State**: PUBLISHED
- **Published Date**: September 10, 2024 at 16:54 UTC
- **Last Updated**: December 31, 2024 at 23:03 UTC
- **Reserved Date**: June 11, 2024 at 22:08 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows TCP/IP Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows 11 version 22H3**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows 11 Version 23H2**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)**
Affected versions:
- 10.0.25398.0 (Status: affected)
**Microsoft - Windows 11 Version 24H2**
Affected versions:
- 10.0.26100.0 (Status: affected)
### References
1. [Windows TCP/IP Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38045)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-2588, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-2588 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2588
- **State**: PUBLISHED
- **Published Date**: January 08, 2024 at 17:50 UTC
- **Last Updated**: May 22, 2025 at 18:23 UTC
- **Reserved Date**: July 29, 2022 at 23:41 UTC
- **Assigned By**: canonical
### Vulnerability Description
It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H`
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**The Linux Kernel Organization - linux**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://ubuntu.com/security/notices/USN-5565-1)
2. [](https://ubuntu.com/security/notices/USN-5562-1)
3. [](https://www.openwall.com/lists/oss-security/2022/08/09/6)
4. [](https://ubuntu.com/security/notices/USN-5582-1)
5. [](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588)
6. [](https://ubuntu.com/security/notices/USN-5564-1)
7. [](https://ubuntu.com/security/notices/USN-5566-1)
8. [](https://www.zerodayinitiative.com/advisories/ZDI-22-1117/)
9. [](https://ubuntu.com/security/notices/USN-5588-1)
10. [](https://ubuntu.com/security/notices/USN-5560-1)
11. [](https://github.com/Markakd/CVE-2022-2588)
12. [](https://ubuntu.com/security/notices/USN-5567-1)
13. [](https://ubuntu.com/security/notices/USN-5560-2)
14. [](https://lore.kernel.org/netdev/20220809170518.164662-1-cascardo@canonical.com/T/#u)
15. [](https://ubuntu.com/security/notices/USN-5557-1)
### Credits
- Zhenpeng Lin working with Trend Micro's Zero Day Initiative
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-22779, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-22779 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-22779
- **State**: PUBLISHED
- **Published Date**: February 09, 2022 at 22:05 UTC
- **Last Updated**: September 17, 2024 at 00:05 UTC
- **Reserved Date**: January 07, 2022 at 00:00 UTC
- **Assigned By**: Zoom
### Vulnerability Description
The Keybase Clients for macOS and Windows before version 5.9.0 fails to properly remove exploded messages initiated by a user. This can occur if the receiving user switches to a non-chat feature and places the host in a sleep state before the sending user explodes the messages. This could lead to disclosure of sensitive information which was meant to be deleted from a user’s filesystem.
### CVSS Metrics
- **CVSS Base Score**: 3.7/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Affected Products
**Zoom Video Communications Inc - Keybase Client for macOS**
Affected versions:
- unspecified (Status: affected)
**Zoom Video Communications Inc - Keybase Client for Windows**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://explore.zoom.us/en/trust/security/security-bulletin)
### Credits
- Olivia O'Hara
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-45575, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-45575 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-45575
- **State**: PUBLISHED
- **Published Date**: May 06, 2025 at 08:32 UTC
- **Last Updated**: May 07, 2025 at 03:55 UTC
- **Reserved Date**: September 02, 2024 at 10:26 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Memory corruption Camera kernel when large number of devices are attached through userspace.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-190: Security Weakness
### Affected Products
**Qualcomm, Inc. - Snapdragon**
Affected versions:
- FastConnect 6900 (Status: affected)
- FastConnect 7800 (Status: affected)
- SDM429W (Status: affected)
- Snapdragon 429 Mobile Platform (Status: affected)
- Snapdragon 8 Gen 1 Mobile Platform (Status: affected)
- SXR2230P (Status: affected)
- SXR2250P (Status: affected)
- WCD9380 (Status: affected)
- WCD9385 (Status: affected)
- WCN3620 (Status: affected)
- WCN3660B (Status: affected)
- WSA8830 (Status: affected)
- WSA8832 (Status: affected)
- WSA8835 (Status: affected)
### References
1. [](https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2025-bulletin.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-13315, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-13315 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13315
- **State**: PUBLISHED
- **Published Date**: February 18, 2025 at 05:22 UTC
- **Last Updated**: February 18, 2025 at 15:52 UTC
- **Reserved Date**: January 09, 2025 at 21:59 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Shopwarden – Automated WooCommerce monitoring & testing plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.11. This is due to missing or incorrect nonce validation on the save_setting() function. This makes it possible for unauthenticated attackers to update arbitrary options and achieve privilege escalation via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**shopwarden - Shopwarden – Automated WooCommerce monitoring & testing**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/b11ed628-f736-4262-80a2-62b32948a3a4?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/shopwarden/trunk/shopwarden.php#L112)
3. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3238978%40shopwarden&new=3238978%40shopwarden&sfp_email=&sfph_mail=)
### Credits
- Brian Sans-Souci
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-8748, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-8748 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-8748
- **State**: REJECTED
- **Last Updated**: March 22, 2023 at 00:00 UTC
- **Reserved Date**: February 06, 2020 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-4497, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-4497 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4497
- **State**: PUBLISHED
- **Published Date**: August 29, 2015 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 06:18 UTC
- **Reserved Date**: June 10, 2015 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
Use-after-free vulnerability in the CanvasRenderingContext2D implementation in Mozilla Firefox before 40.0.3 and Firefox ESR 38.x before 38.2.1 allows remote attackers to execute arbitrary code by leveraging improper interaction between resize events and changes to Cascading Style Sheets (CSS) token sequences for a CANVAS element.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.mozilla.org/security/announce/2015/mfsa2015-94.html)
2. [DSA-3345](http://www.debian.org/security/2015/dsa-3345)
3. [SUSE-SU-2015:2081](http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html)
4. [USN-2723-1](http://www.ubuntu.com/usn/USN-2723-1)
5. [](http://www.zerodayinitiative.com/advisories/ZDI-15-406)
6. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1175278)
7. [](http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html)
8. [SUSE-SU-2015:1504](http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00013.html)
9. [openSUSE-SU-2015:1492](http://lists.opensuse.org/opensuse-updates/2015-09/msg00000.html)
10. [76502](http://www.securityfocus.com/bid/76502)
11. [RHSA-2015:1693](http://rhn.redhat.com/errata/RHSA-2015-1693.html)
12. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1164766)
13. [1033397](http://www.securitytracker.com/id/1033397)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-20744, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-20744 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-20744
- **State**: PUBLISHED
- **Published Date**: May 03, 2022 at 03:20 UTC
- **Last Updated**: November 06, 2024 at 16:17 UTC
- **Reserved Date**: November 02, 2021 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the input protection mechanisms of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to view data without proper authorization. This vulnerability exists because of a protection mechanism that relies on the existence or values of a specific input. An attacker could exploit this vulnerability by modifying this input to bypass the protection mechanism and sending a crafted request to an affected device. A successful exploit could allow the attacker to view data beyond the scope of their authorization.
### Weakness Classification (CWE)
- CWE-807: Security Weakness
### Affected Products
**Cisco - Cisco Firepower Management Center**
Affected versions:
- n/a (Status: affected)
### References
1. [20220427 Cisco Firepower Management Center Software Information Disclosure Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-infdisc-guJWRwQu)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-32023, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-32023 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-32023
- **State**: PUBLISHED
- **Published Date**: November 10, 2021 at 17:35 UTC
- **Last Updated**: August 03, 2024 at 23:17 UTC
- **Reserved Date**: May 03, 2021 at 00:00 UTC
- **Assigned By**: blackberry
### Vulnerability Description
An elevation of privilege vulnerability in the message broker of BlackBerry Protect for Windows version(s) versions 1574 and earlier could allow an attacker to potentially execute code in the context of a BlackBerry Cylance service that has admin rights on the system.
### Affected Products
**n/a - BlackBerry Protect for Windows**
Affected versions:
- Version 1574 and earlier (Status: affected)
### References
1. [](https://support.blackberry.com/kb/articleDetail?articleNumber=000088685)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-11328, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-11328 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-11328
- **State**: PUBLISHED
- **Published Date**: January 09, 2025 at 11:10 UTC
- **Last Updated**: January 09, 2025 at 15:06 UTC
- **Reserved Date**: November 18, 2024 at 15:13 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The CLUEVO LMS, E-Learning Platform plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.13.2. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**cluevo - CLUEVO LMS, E-Learning Platform**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/5bcfe315-2db1-4f6c-9635-a7fdf5404adf?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/cluevo-lms/tags/1.13.2/functions/functions.module-management.inc.php#L788)
3. [](https://plugins.trac.wordpress.org/browser/cluevo-lms/tags/1.13.2/admin-views/class.module-ratings-page.php#L173)
4. [](https://plugins.trac.wordpress.org/browser/cluevo-lms/tags/1.13.2/functions/functions.module-management.inc.php#L1228)
5. [](https://plugins.trac.wordpress.org/browser/cluevo-lms/tags/1.13.2/functions/functions.module-management.inc.php#L1230)
6. [](https://plugins.trac.wordpress.org/browser/cluevo-lms/tags/1.13.2/functions/functions.module-management.inc.php#L1242)
### Credits
- Dale Mavers
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-23708, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-23708 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-23708
- **State**: PUBLISHED
- **Published Date**: January 16, 2025 at 20:06 UTC
- **Last Updated**: January 17, 2025 at 19:13 UTC
- **Reserved Date**: January 16, 2025 at 11:28 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Dominic Fallows DF Draggable allows Stored XSS.This issue affects DF Draggable: from n/a through 1.13.2.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Dominic Fallows - DF Draggable**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/df-draggable/vulnerability/wordpress-df-draggable-plugin-1-13-2-csrf-to-stored-xss-vulnerability?_s_id=cve)
### Credits
- SOPROBRO (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-8576, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-8576 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8576
- **State**: PUBLISHED
- **Published Date**: September 08, 2024 at 18:00 UTC
- **Last Updated**: September 10, 2024 at 14:57 UTC
- **Reserved Date**: September 07, 2024 at 17:15 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in TOTOLINK AC1200 T8 and AC1200 T10 4.1.5cu.861_B20230220/4.1.8cu.5207. It has been classified as critical. Affected is the function setIpPortFilterRules of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument desc leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
### Affected Products
**TOTOLINK - AC1200 T8**
Affected versions:
- 4.1.5cu.861_B20230220 (Status: affected)
- 4.1.8cu.5207 (Status: affected)
**TOTOLINK - AC1200 T10**
Affected versions:
- 4.1.5cu.861_B20230220 (Status: affected)
- 4.1.8cu.5207 (Status: affected)
### References
1. [VDB-276810 | TOTOLINK AC1200 T8/AC1200 T10 cstecgi.cgi setIpPortFilterRules buffer overflow](https://vuldb.com/?id.276810)
2. [VDB-276810 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.276810)
3. [Submit #401264 | TOTOLINK AC1200 T8 V4.1.5cu.861_B20230220 Buffer Overflow](https://vuldb.com/?submit.401264)
4. [](https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/AC1200T8/setIpPortFilterRules.md)
5. [](https://www.totolink.net/)
### Credits
- yhryhryhr_tu (VulDB User)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-8007, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-8007 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-8007
- **State**: PUBLISHED
- **Published Date**: July 11, 2018 at 13:00 UTC
- **Last Updated**: September 16, 2024 at 17:04 UTC
- **Reserved Date**: March 09, 2018 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
Apache CouchDB administrative users can configure the database server via HTTP(S). Due to insufficient validation of administrator-supplied configuration settings via the HTTP API, it is possible for a CouchDB administrator user to escalate their privileges to that of the operating system's user that CouchDB runs under, by bypassing the blacklist of configuration settings that are not allowed to be modified via the HTTP API. This privilege escalation effectively allows an existing CouchDB admin user to gain arbitrary remote code execution, bypassing already disclosed CVE-2017-12636. Mitigation: All users should upgrade to CouchDB releases 1.7.2 or 2.1.2.
### Affected Products
**Apache Software Foundation - Apache CouchDB**
Affected versions:
- < 1.7.2 (Status: affected)
- 2.0.0 to 2.1.1 (Status: affected)
### References
1. [[couchdb-announce] 20180710 Apache CouchDB 2.1.2 released](http://mail-archives.apache.org/mod_mbox/couchdb-announce/201807.mbox/%3c1439409216.6221.1531246856676.JavaMail.Joan%40RITA%3e)
2. [GLSA-201812-06](https://security.gentoo.org/glsa/201812-06)
3. [[couchdb-announce] 20180710 Apache CouchDB 1.7.2 released](http://mail-archives.apache.org/mod_mbox/couchdb-announce/201807.mbox/%3C1699016538.6219.1531246785603.JavaMail.Joan%40RITA%3E)
4. [104741](http://www.securityfocus.com/bid/104741)
5. [](https://www.mdsec.co.uk/2018/08/advisory-cve-2018-8007-apache-couchdb-remote-code-execution/)
6. [](https://blog.couchdb.org/2018/07/10/cve-2018-8007/)
7. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbmu03935en_us)
8. [FEDORA-2020-83f513fd7e](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X3JOUCX7LHDV4YWZDQNXT5NTKKRANZQW/)
9. [FEDORA-2020-73bd8167a0](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S5FPHVVU5KMRFKQTJPAM3TBGC7LKCWQS/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-46592, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-46592 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-46592
- **State**: PUBLISHED
- **Published Date**: December 30, 2022 at 00:00 UTC
- **Last Updated**: April 11, 2025 at 15:08 UTC
- **Reserved Date**: December 05, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the wps_sta_enrollee_pin parameter in the set_sta_enrollee_pin_5g function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://brief-nymphea-813.notion.site/Vul8-TEW755-bof-set_sta_enrollee_pin_5g-60fb8f382256478dbe8d4c9c35e8dd60)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2000-0870, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2000-0870 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-0870
- **State**: PUBLISHED
- **Published Date**: January 22, 2001 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 05:37 UTC
- **Reserved Date**: October 18, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in EFTP allows remote attackers to cause a denial of service via a long string.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1555](http://www.osvdb.org/1555)
2. [1675](http://www.securityfocus.com/bid/1675)
3. [eftp-bo(5219)](https://exchange.xforce.ibmcloud.com/vulnerabilities/5219)
4. [20000911[EXPL] EFTP vulnerable to two DoS attacks](http://archives.neohapsis.com/archives/bugtraq/2000-09/0089.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-10815, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-10815 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-10815
- **State**: PUBLISHED
- **Published Date**: August 04, 2017 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 17:50 UTC
- **Reserved Date**: July 04, 2017 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
MaLion for Windows 5.2.1 and earlier (only when "Remote Control" is installed) and MaLion for Mac 4.0.1 to 5.2.1 (only when "Remote Control" is installed) allow remote attackers to bypass authentication to execute arbitrary commands or operations on Terminal Agent.
### Affected Products
**Intercom, Inc. - MaLion for Windows**
Affected versions:
- 5.2.1 and earlier (only when "Remote Control" is installed) (Status: affected)
**Intercom, Inc. - MaLion for Mac**
Affected versions:
- 4.0.1 to 5.2.1 (only when "Remote Control" is installed) (Status: affected)
### References
1. [](http://www.intercom.co.jp/information/2017/0801.html)
2. [](https://jvn.jp/en/vu/JVNVU91587298/index.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-12828, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-12828 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-12828
- **State**: REJECTED
- **Published Date**: March 05, 2019 at 20:00 UTC
- **Last Updated**: March 05, 2019 at 19:57 UTC
- **Reserved Date**: August 11, 2017 at 00:00 UTC
- **Assigned By**: airbus
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2010-4031, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2010-4031 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4031
- **State**: PUBLISHED
- **Published Date**: November 01, 2010 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 03:34 UTC
- **Reserved Date**: October 21, 2010 at 00:00 UTC
- **Assigned By**: hp
### Vulnerability Description
Unspecified vulnerability in HP Insight Control Performance Management before 6.2 allows remote authenticated users to gain privileges via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2010-2832](http://www.vupen.com/english/advisories/2010/2832)
2. [hp-performance-unspec-privilege-escalation(62886)](https://exchange.xforce.ibmcloud.com/vulnerabilities/62886)
3. [1024672](http://www.securitytracker.com/id?1024672)
4. [SSRT100317](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02563642)
5. [HPSBMA02602](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02563642)
6. [44582](http://www.securityfocus.com/bid/44582)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2011-1151, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2011-1151 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1151
- **State**: PUBLISHED
- **Published Date**: February 05, 2020 at 21:39 UTC
- **Last Updated**: August 06, 2024 at 22:14 UTC
- **Reserved Date**: March 03, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Joomla! 1.6.0 is vulnerable to SQL Injection via the filter_order and filer_order_Dir parameters.
### Affected Products
**Joomla! - Joomla!**
Affected versions:
- 1.6.0 (Status: affected)
### References
1. [](https://www.openwall.com/lists/oss-security/2011/03/14/21)
2. [](https://packetstormsecurity.com/files/101835/Joomla-1.6.0-SQL-Injection.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-25017, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-25017 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25017
- **State**: PUBLISHED
- **Published Date**: March 27, 2023 at 00:00 UTC
- **Last Updated**: February 19, 2025 at 15:52 UTC
- **Reserved Date**: February 02, 2023 at 00:00 UTC
- **Assigned By**: twcert
### Vulnerability Description
RIFARTEK IOT Wall has a vulnerability of incorrect authorization. An authenticated remote attacker with general user privilege is allowed to perform specific privileged function to access and modify all sensitive data.
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-863: Incorrect Authorization
### Affected Products
**Rifartek - IOT Wall**
Affected versions:
- 22 (Status: affected)
### References
1. [](https://www.twcert.org.tw/tw/cp-132-6962-34ac1-1.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-8818, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-8818 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-8818
- **State**: PUBLISHED
- **Published Date**: December 16, 2016 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 02:35 UTC
- **Reserved Date**: October 18, 2016 at 00:00 UTC
- **Assigned By**: nvidia
### Vulnerability Description
All versions of NVIDIA Windows GPU Display contain a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgDdiEscape where a pointer passed from a user to the driver is used without validation, leading to denial of service or potential escalation of privileges.
### Affected Products
**Nvidia Corporation - Quadro, NVS, GeForce, GRID and Tesla**
Affected versions:
- All (Status: affected)
### References
1. [](http://nvidia.custhelp.com/app/answers/detail/a_id/4257)
2. [95056](http://www.securityfocus.com/bid/95056)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-2292, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-2292 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2292
- **State**: PUBLISHED
- **Published Date**: July 22, 2019 at 13:47 UTC
- **Last Updated**: August 04, 2024 at 18:42 UTC
- **Reserved Date**: December 10, 2018 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Out of bound access can occur due to buffer copy without checking size of input received from WLAN firmware in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in MDM9150, MDM9650, MSM8996AU, QCA6574AU, QCS405, QCS605, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 636, SD 665, SD 712 / SD 710 / SD 670, SD 730, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM630, SDM660, SDX20, SDX24
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music**
Affected versions:
- MDM9150, MDM9650, MSM8996AU, QCA6574AU, QCS405, QCS605, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 636, SD 665, SD 712 / SD 710 / SD 670, SD 730, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM630, SDM660, SDX20, SDX24 (Status: affected)
### References
1. [](https://www.codeaurora.org/security-bulletin/2019/06/03/june-2019-code-aurora-security-bulletin)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-26430, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-26430 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-26430
- **State**: PUBLISHED
- **Published Date**: August 12, 2021 at 18:11 UTC
- **Last Updated**: August 03, 2024 at 20:26 UTC
- **Reserved Date**: January 29, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Azure Sphere Denial of Service Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H/E:P/RL:O/RC:C`
### Affected Products
**Microsoft - Azure Sphere**
Affected versions:
- 20.00 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26430)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-7683, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-7683 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-7683
- **State**: PUBLISHED
- **Published Date**: August 12, 2024 at 01:00 UTC
- **Last Updated**: August 13, 2024 at 20:10 UTC
- **Reserved Date**: August 11, 2024 at 18:05 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as problematic has been found in SourceCodester Kortex Lite Advocate Office Management System 1.0. Affected is an unknown function of the file addcase_stage.php. The manipulation of the argument cname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**SourceCodester - Kortex Lite Advocate Office Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-274140 | SourceCodester Kortex Lite Advocate Office Management System addcase_stage.php cross site scripting](https://vuldb.com/?id.274140)
2. [VDB-274140 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.274140)
3. [Submit #389162 | SourceCodester Kortex Lite Advocate Office Management System 1.0 Cross Site Scripting](https://vuldb.com/?submit.389162)
4. [](https://github.com/samwbs/kortexcve/blob/main/xss_addcase_stage/xss_addcase_stage.md)
### Credits
- samwbs (VulDB User)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-49667, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-49667 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-49667
- **State**: PUBLISHED
- **Published Date**: February 26, 2025 at 02:24 UTC
- **Last Updated**: May 04, 2025 at 08:42 UTC
- **Reserved Date**: February 26, 2025 at 02:21 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
net: bonding: fix use-after-free after 802.3ad slave unbind
commit 0622cab0341c ("bonding: fix 802.3ad aggregator reselection"),
resolve case, when there is several aggregation groups in the same bond.
bond_3ad_unbind_slave will invalidate (clear) aggregator when
__agg_active_ports return zero. So, ad_clear_agg can be executed even, when
num_of_ports!=0. Than bond_3ad_unbind_slave can be executed again for,
previously cleared aggregator. NOTE: at this time bond_3ad_unbind_slave
will not update slave ports list, because lag_ports==NULL. So, here we
got slave ports, pointing to freed aggregator memory.
Fix with checking actual number of ports in group (as was before
commit 0622cab0341c ("bonding: fix 802.3ad aggregator reselection") ),
before ad_clear_agg().
The KASAN logs are as follows:
[ 767.617392] ==================================================================
[ 767.630776] BUG: KASAN: use-after-free in bond_3ad_state_machine_handler+0x13dc/0x1470
[ 767.638764] Read of size 2 at addr ffff00011ba9d430 by task kworker/u8:7/767
[ 767.647361] CPU: 3 PID: 767 Comm: kworker/u8:7 Tainted: G O 5.15.11 #15
[ 767.655329] Hardware name: DNI AmazonGo1 A7040 board (DT)
[ 767.660760] Workqueue: lacp_1 bond_3ad_state_machine_handler
[ 767.666468] Call trace:
[ 767.668930] dump_backtrace+0x0/0x2d0
[ 767.672625] show_stack+0x24/0x30
[ 767.675965] dump_stack_lvl+0x68/0x84
[ 767.679659] print_address_description.constprop.0+0x74/0x2b8
[ 767.685451] kasan_report+0x1f0/0x260
[ 767.689148] __asan_load2+0x94/0xd0
[ 767.692667] bond_3ad_state_machine_handler+0x13dc/0x1470
### Affected Products
**Linux - Linux**
Affected versions:
- 0622cab0341cac6b30da177b0faa39fae0680e71 (Status: affected)
- 0622cab0341cac6b30da177b0faa39fae0680e71 (Status: affected)
- 0622cab0341cac6b30da177b0faa39fae0680e71 (Status: affected)
- 0622cab0341cac6b30da177b0faa39fae0680e71 (Status: affected)
- 0622cab0341cac6b30da177b0faa39fae0680e71 (Status: affected)
- 0622cab0341cac6b30da177b0faa39fae0680e71 (Status: affected)
- 0622cab0341cac6b30da177b0faa39fae0680e71 (Status: affected)
- 0622cab0341cac6b30da177b0faa39fae0680e71 (Status: affected)
**Linux - Linux**
Affected versions:
- 4.7 (Status: affected)
- 0 (Status: unaffected)
- 4.9.322 (Status: unaffected)
- 4.14.287 (Status: unaffected)
- 4.19.251 (Status: unaffected)
- 5.4.204 (Status: unaffected)
- 5.10.129 (Status: unaffected)
- 5.15.53 (Status: unaffected)
- 5.18.10 (Status: unaffected)
- 5.19 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/a853b7a3a9fd1d74a4ccdd9cd73512b7dace2f1e)
2. [](https://git.kernel.org/stable/c/b90ac60303063a43e17dd4aec159067599d255e6)
3. [](https://git.kernel.org/stable/c/f162f7c348fa2a5555bafdb5cc890b89b221e69c)
4. [](https://git.kernel.org/stable/c/893825289ba840afd86bfffcb6f7f363c73efff8)
5. [](https://git.kernel.org/stable/c/63b2fe509f69b90168a75e04e14573dccf7984e6)
6. [](https://git.kernel.org/stable/c/ef0af7d08d26c5333ff4944a559279464edf6f15)
7. [](https://git.kernel.org/stable/c/2765749def4765c5052a4c66445cf4c96fcccdbc)
8. [](https://git.kernel.org/stable/c/050133e1aa2cb49bb17be847d48a4431598ef562)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-34357, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-34357 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-34357
- **State**: PUBLISHED
- **Published Date**: February 24, 2024 at 15:38 UTC
- **Last Updated**: February 13, 2025 at 16:32 UTC
- **Reserved Date**: June 23, 2022 at 13:42 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Cognos Analytics Mobile Server 11.1.7, 11.2.4, and 12.0.0 is vulnerable to Denial of Service due to due to weak or absence of rate limiting. By making unlimited http requests, it is possible for a single user to exhaust server resources over a period of time making service unavailable for other legitimate users. IBM X-Force ID: 230510.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-770: Security Weakness
### Affected Products
**IBM - Cognos Analytics**
Affected versions:
- 11.1.7, 11.2.4, 12.0.0 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/7123154)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/230510)
3. [](https://security.netapp.com/advisory/ntap-20240405-0001/)
4. [](https://security.netapp.com/advisory/ntap-20240621-0006/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-14010, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-14010 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14010
- **State**: PUBLISHED
- **Published Date**: June 10, 2020 at 17:17 UTC
- **Last Updated**: August 04, 2024 at 12:32 UTC
- **Reserved Date**: June 10, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Laborator Xenon theme 1.3 for WordPress allows Reflected XSS via the data/typeahead-generate.php q (aka name) parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://knassar702.github.io/cve/xenon/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2003-0825, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2003-0825 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-0825
- **State**: PUBLISHED
- **Published Date**: September 01, 2004 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 02:05 UTC
- **Reserved Date**: September 18, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Windows Internet Naming Service (WINS) for Microsoft Windows Server 2003, and possibly Windows NT and Server 2000, does not properly validate the length of certain packets, which allows attackers to cause a denial of service and possibly execute arbitrary code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [win-wins-gsflag-dos(15037)](https://exchange.xforce.ibmcloud.com/vulnerabilities/15037)
2. [O-077](http://www.ciac.org/ciac/bulletins/o-077.shtml)
3. [3903](http://www.osvdb.org/3903)
4. [oval:org.mitre.oval:def:801](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A801)
5. [oval:org.mitre.oval:def:800](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A800)
6. [oval:org.mitre.oval:def:704](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A704)
7. [9624](http://www.securityfocus.com/bid/9624)
8. [MS04-006](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-006)
9. [oval:org.mitre.oval:def:802](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A802)
10. [VU#445214](http://www.kb.cert.org/vuls/id/445214)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2012-3139, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2012-3139 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-3139
- **State**: PUBLISHED
- **Published Date**: October 16, 2012 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 19:57 UTC
- **Reserved Date**: June 06, 2012 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Oracle Application Object Library component in Oracle E-Business Suite 11.5.10.2 allows remote attackers to affect integrity, related to Signon (local and SSO).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html)
2. [MDVSA-2013:150](http://www.mandriva.com/security/advisories?name=MDVSA-2013:150)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-14183, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-14183 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-14183
- **State**: REJECTED
- **Published Date**: December 20, 2021 at 22:44 UTC
- **Last Updated**: December 20, 2021 at 22:44 UTC
- **Reserved Date**: July 19, 2019 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2007-3534, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2007-3534 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3534
- **State**: PUBLISHED
- **Published Date**: July 03, 2007 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 14:21 UTC
- **Reserved Date**: July 03, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in login.php in WebChat 0.78 allows remote attackers to execute arbitrary SQL commands via the rid parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [25892](http://secunia.com/advisories/25892)
2. [4125](https://www.exploit-db.com/exploits/4125)
3. [24701](http://www.securityfocus.com/bid/24701)
4. [webchat-login-sql-injection(35161)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35161)
5. [36295](http://osvdb.org/36295)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2006-6454, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2006-6454 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-6454
- **State**: PUBLISHED
- **Published Date**: December 10, 2006 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 20:26 UTC
- **Reserved Date**: December 10, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
execInBackground.php in J-OWAMP Web Interface 2.1b and earlier allows remote attackers to execute arbitrary commands via shell metacharacters to the (1) exe and (2) args parameters, which are used in an exec function call. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [jowamp-execinbackground-command-execution(30781)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30781)
2. [ADV-2006-4905](http://www.vupen.com/english/advisories/2006/4905)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-21266, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-21266 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-21266
- **State**: REJECTED
- **Published Date**: October 22, 2020 at 21:29 UTC
- **Last Updated**: October 22, 2020 at 21:29 UTC
- **Reserved Date**: June 25, 2020 at 00:00 UTC
- **Assigned By**: synology
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2012-1104, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2012-1104 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-1104
- **State**: PUBLISHED
- **Published Date**: December 05, 2019 at 17:49 UTC
- **Last Updated**: August 06, 2024 at 18:45 UTC
- **Reserved Date**: February 14, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A Security Bypass vulnerability exists in the phpCAS 1.2.2 library from the jasig project due to the way proxying of services are managed.
### Affected Products
**jasig project - phpCAS**
Affected versions:
- 1.2.2 (Status: affected)
### References
1. [](https://security-tracker.debian.org/tracker/CVE-2012-1104)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1104)
3. [](http://www.openwall.com/lists/oss-security/2012/03/05/7)
4. [](https://www.securityfocus.com/bid/52279)
5. [](https://gitlab.vsb.cz/kal0178/sixmon/blob/b18bcde090dc38fc968a0b1e38d1dab08b8c369e/web/lib/CAS/CAS-1.3.5/docs/ChangeLog)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-0437, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-0437 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0437
- **State**: PUBLISHED
- **Published Date**: October 05, 2018 at 14:00 UTC
- **Last Updated**: November 26, 2024 at 14:43 UTC
- **Reserved Date**: November 27, 2017 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the Cisco Umbrella Enterprise Roaming Client (ERC) could allow an authenticated, local attacker to elevate privileges to Administrator. To exploit the vulnerability, the attacker must authenticate with valid local user credentials. This vulnerability is due to improper implementation of file system permissions, which could allow non-administrative users to place files within restricted directories. An attacker could exploit this vulnerability by placing an executable file within the restricted directory, which when executed by the ERC client, would run with Administrator privileges.
### Weakness Classification (CWE)
- CWE-264: Security Weakness
### Affected Products
**Cisco - Cisco Umbrella**
Affected versions:
- n/a (Status: affected)
### References
1. [45339](https://www.exploit-db.com/exploits/45339/)
2. [105292](http://www.securityfocus.com/bid/105292)
3. [20180905 Cisco Umbrella Enterprise Roaming Client and Enterprise Roaming Module Privilege Escalation Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-umbrella-priv)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-5026, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-5026 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-5026
- **State**: REJECTED
- **Last Updated**: June 07, 2025 at 22:16 UTC
- **Reserved Date**: May 21, 2025 at 07:02 UTC
- **Assigned By**: GitLab
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2007-1509, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2007-1509 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1509
- **State**: PUBLISHED
- **Published Date**: March 20, 2007 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 12:59 UTC
- **Reserved Date**: March 20, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in enkrypt.php in Sascha Schroeder krypt (aka Holtstraeter Rot 13) allows remote attackers to read arbitrary files via a .. (dot dot) in the datei parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20070316 Rot 13 <= (enkrypt.php) Remote File Disclosure Vulnerability](http://www.securityfocus.com/archive/1/463011/100/0/threaded)
2. [34089](http://osvdb.org/34089)
3. [rot-enkrypt-directory-traversal(33027)](https://exchange.xforce.ibmcloud.com/vulnerabilities/33027)
4. [22997](http://www.securityfocus.com/bid/22997)
5. [2458](http://securityreason.com/securityalert/2458)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2013-4064, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2013-4064 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4064
- **State**: PUBLISHED
- **Published Date**: December 21, 2013 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 16:30 UTC
- **Reserved Date**: June 07, 2013 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in iNotes in IBM Domino 8.5.x before 8.5.3 FP6 and 9.0.x before 9.0.1, when ultra-light mode is enabled, allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors, aka SPR PTHN9ARMFA.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ibm-inotes-cve20134064-xss(86595)](https://exchange.xforce.ibmcloud.com/vulnerabilities/86595)
2. [](http://www-01.ibm.com/support/docview.wss?uid=swg21659959)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-5557, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-5557 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5557
- **State**: REJECTED
- **Published Date**: December 23, 2019 at 20:41 UTC
- **Last Updated**: December 23, 2019 at 20:41 UTC
- **Reserved Date**: January 07, 2019 at 00:00 UTC
- **Assigned By**: vmware
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-0146, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-0146 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0146
- **State**: PUBLISHED
- **Published Date**: January 28, 2025 at 04:09 UTC
- **Last Updated**: January 28, 2025 at 15:14 UTC
- **Reserved Date**: December 02, 2023 at 00:42 UTC
- **Assigned By**: nvidia
### Vulnerability Description
NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager, where a malicious guest could cause memory corruption. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, or data tampering.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
### Affected Products
**NVIDIA - NVIDIA vGPU software**
Affected versions:
- R530, R535 (Status: affected)
### References
1. [](https://nvidia.custhelp.com/app/answers/detail/a_id/5614)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2006-4469, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2006-4469 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-4469
- **State**: PUBLISHED
- **Published Date**: August 31, 2006 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 19:14 UTC
- **Reserved Date**: August 31, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in PEAR.php in Joomla! before 1.0.11 allows remote attackers to perform "remote execution," related to "Injection Flaws."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2006-3408](http://www.vupen.com/english/advisories/2006/3408)
2. [](http://www.joomla.org/content/view/1841/78/)
3. [21666](http://secunia.com/advisories/21666)
4. [](http://www.joomla.org/content/view/1843/74/)
5. [joomla-pear-command-execution(28629)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28629)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2006-1391, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2006-1391 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1391
- **State**: PUBLISHED
- **Published Date**: March 25, 2006 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 17:12 UTC
- **Reserved Date**: March 24, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The (a) Quick 'n Easy Web Server before 3.1.1 and (b) Baby ASP Web Server 2.7.2 allows remote attackers to obtain the source code of ASP files via (1) . (dot) and (2) space characters in the extension of a URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [17222](http://www.securityfocus.com/bid/17222)
2. [19312](http://secunia.com/advisories/19312)
3. [20060324 Secunia Research: Quick 'n Easy/Baby Web Server ASP CodeDisclosure Vulnerability](http://www.securityfocus.com/archive/1/428667/100/0/threaded)
4. [ADV-2006-1085](http://www.vupen.com/english/advisories/2006/1085)
5. [quickneasy-web-asp-disclosure(25418)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25418)
6. [24100](http://www.osvdb.org/24100)
7. [24099](http://www.osvdb.org/24099)
8. [624](http://securityreason.com/securityalert/624)
9. [baby-web-asp-disclosure(25417)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25417)
10. [19306](http://secunia.com/advisories/19306)
11. [](http://secunia.com/secunia_research/2006-19/advisory/)
12. [ADV-2006-1088](http://www.vupen.com/english/advisories/2006/1088)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-13646, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-13646 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-13646
- **State**: PUBLISHED
- **Published Date**: July 18, 2019 at 02:17 UTC
- **Last Updated**: August 04, 2024 at 23:57 UTC
- **Reserved Date**: July 17, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Firefly III before 4.7.17.3 is vulnerable to reflected XSS due to lack of filtration of user-supplied data in a search query. NOTE: It is asserted that an attacker must have the same access rights as the user in order to be able to execute the vulnerability
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/firefly-iii/firefly-iii/compare/a70b7cc...7d482aa)
2. [](https://github.com/firefly-iii/firefly-iii/issues/2339)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-28374, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-28374 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-28374
- **State**: PUBLISHED
- **Published Date**: July 14, 2022 at 12:28 UTC
- **Last Updated**: August 03, 2024 at 05:56 UTC
- **Reserved Date**: April 03, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Verizon 5G Home LVSKIHP OutDoorUnit (ODU) 3.33.101.0 does not property sanitize user-controlled parameters within the DMACC URLs on the Settings page of the Engineering portal. An authenticated remote attacker on the local network can inject shell metacharacters into /usr/lib/lua/5.1/luci/controller/admin/settings.lua to achieve remote code execution as root.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.verizon.com/info/reportsecurityvulnerability/)
2. [](https://github.com/JousterL/SecWriteups/blob/main/Verizon%20LVSKIHP%205G%20Modem/readme.md)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-47123, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-47123 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-47123
- **State**: PUBLISHED
- **Published Date**: March 15, 2024 at 20:14 UTC
- **Last Updated**: May 04, 2025 at 07:04 UTC
- **Reserved Date**: March 04, 2024 at 18:12 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
io_uring: fix ltout double free on completion race
Always remove linked timeout on io_link_timeout_fn() from the master
request link list, otherwise we may get use-after-free when first
io_link_timeout_fn() puts linked timeout in the fail path, and then
will be found and put on master's free.
### Affected Products
**Linux - Linux**
Affected versions:
- 90cd7e424969d29aff653333b4dcb4e2e199d791 (Status: affected)
- 90cd7e424969d29aff653333b4dcb4e2e199d791 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.11 (Status: affected)
- 0 (Status: unaffected)
- 5.12.10 (Status: unaffected)
- 5.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/1f64f5e903b9d1d157875721e02adadc9d6f0a5d)
2. [](https://git.kernel.org/stable/c/447c19f3b5074409c794b350b10306e1da1ef4ba)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-32448, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-32448 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-32448
- **State**: PUBLISHED
- **Published Date**: April 15, 2024 at 07:54 UTC
- **Last Updated**: August 02, 2024 at 02:06 UTC
- **Reserved Date**: April 12, 2024 at 14:58 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in VideoYield.Com Ads.Txt Admin.This issue affects Ads.Txt Admin: from n/a through 1.3.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**VideoYield.com - Ads.txt Admin**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/ads-txt-admin/wordpress-ads-txt-admin-plugin-1-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Joshua Chan (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-3307, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-3307 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3307
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: March 15, 2016 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2009-2239, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2009-2239 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-2239
- **State**: PUBLISHED
- **Published Date**: June 27, 2009 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 05:44 UTC
- **Reserved Date**: June 27, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in the (1) casinobase (com_casinobase), (2) casino_blackjack (com_casino_blackjack), and (3) casino_videopoker (com_casino_videopoker) components 0.3.1 for Joomla! allows remote attackers to execute arbitrary SQL commands via the Itemid parameter to index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [casino-index-sql-injection(50645)](https://exchange.xforce.ibmcloud.com/vulnerabilities/50645)
2. [35041](http://www.securityfocus.com/bid/35041)
3. [8743](http://www.exploit-db.com/exploits/8743)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-6267, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-6267 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-6267
- **State**: PUBLISHED
- **Published Date**: September 22, 2017 at 17:00 UTC
- **Last Updated**: September 16, 2024 at 16:22 UTC
- **Reserved Date**: February 23, 2017 at 00:00 UTC
- **Assigned By**: nvidia
### Vulnerability Description
NVIDIA GPU Display Driver contains a vulnerability in the kernel mode layer handler where an incorrect initialization of internal objects can cause an infinite loop which may lead to a denial of service.
### Affected Products
**Nvidia Corporation - GPU Display Driver**
Affected versions:
- All (Status: affected)
### References
1. [](http://nvidia.custhelp.com/app/answers/detail/a_id/4544)
2. [101025](http://www.securityfocus.com/bid/101025)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-23363, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-23363 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-23363
- **State**: PUBLISHED
- **Published Date**: May 09, 2023 at 00:00 UTC
- **Last Updated**: January 29, 2025 at 14:47 UTC
- **Reserved Date**: August 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross Site Request Forgery (CSRF) vulnerability found in Verytops Verydows all versions that allows an attacker to execute arbitrary code via a crafted script.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Verytops/verydows/issues/17)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-31404, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-31404 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-31404
- **State**: PUBLISHED
- **Published Date**: May 09, 2023 at 01:37 UTC
- **Last Updated**: January 28, 2025 at 19:08 UTC
- **Reserved Date**: April 27, 2023 at 18:29 UTC
- **Assigned By**: sap
### Vulnerability Description
Under certain conditions, SAP BusinessObjects Business Intelligence Platform (Central Management Service) - versions 420, 430, allows an attacker to access information which would otherwise be restricted. Some users with specific privileges could have access to credentials of other users. It could let them access data sources which would otherwise be restricted.
### CVSS Metrics
- **CVSS Base Score**: 5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**SAP_SE - SAP BusinessObjects Business Intelligence Platform (Central Management Service)**
Affected versions:
- 420 (Status: affected)
- 430 (Status: affected)
### References
1. [](https://launchpad.support.sap.com/#/notes/3038911)
2. [](https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-12954, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-12954 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-12954
- **State**: PUBLISHED
- **Published Date**: February 17, 2020 at 16:42 UTC
- **Last Updated**: August 04, 2024 at 23:32 UTC
- **Reserved Date**: June 24, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SolarWinds Network Performance Monitor (Orion Platform 2018, NPM 12.3, NetPath 1.1.3) allows XSS by authenticated users via a crafted onerror attribute of a VIDEO element in an action for an ALERT.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.esecforte.com/cve-2019-12954-solarwinds-network-performance-monitor-orion-platform-2018-npm-12-3-netpath-1-1-3-vulnerable-for-stored-xss/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-16115, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-16115 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16115
- **State**: PUBLISHED
- **Published Date**: August 29, 2018 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 10:17 UTC
- **Reserved Date**: August 29, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Lightbend Akka 2.5.x before 2.5.16 allows message disclosure and modification because of an RNG error. A random number generator is used in Akka Remoting for TLS (both classic and Artery Remoting). Akka allows configuration of custom random number generators. For historical reasons, Akka included the AES128CounterSecureRNG and AES256CounterSecureRNG random number generators. The implementations had a bug that caused the generated numbers to be repeated after only a few bytes. The custom RNG implementations were not configured by default but examples in the documentation showed (and therefore implicitly recommended) using the custom ones. This can be used by an attacker to compromise the communication if these random number generators are enabled in configuration. It would be possible to eavesdrop, replay, or modify the messages sent with Akka Remoting/Cluster.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://doc.akka.io/docs/akka/current/security/2018-08-29-aes-rng.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-5480, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-5480 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5480
- **State**: REJECTED
- **Published Date**: January 25, 2021 at 17:53 UTC
- **Last Updated**: January 25, 2021 at 17:53 UTC
- **Reserved Date**: January 03, 2020 at 00:00 UTC
- **Assigned By**: pivotal
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-33439, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-33439 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-33439
- **State**: PUBLISHED
- **Published Date**: May 26, 2023 at 00:00 UTC
- **Last Updated**: January 14, 2025 at 20:37 UTC
- **Reserved Date**: May 22, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Sourcecodester Faculty Evaluation System v1.0 is vulnerable to SQL Injection via /eval/admin/manage_task.php?id=.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/F14me7wq/bug_report/blob/main/vendors/oretnom23/faculty-evaluation-system/SQLi-1.md)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-48975, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-48975 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-48975
- **State**: PUBLISHED
- **Published Date**: October 21, 2024 at 20:05 UTC
- **Last Updated**: May 04, 2025 at 08:27 UTC
- **Reserved Date**: August 22, 2024 at 01:27 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
gpiolib: fix memory leak in gpiochip_setup_dev()
Here is a backtrace report about memory leak detected in
gpiochip_setup_dev():
unreferenced object 0xffff88810b406400 (size 512):
comm "python3", pid 1682, jiffies 4295346908 (age 24.090s)
backtrace:
kmalloc_trace
device_add device_private_init at drivers/base/core.c:3361
(inlined by) device_add at drivers/base/core.c:3411
cdev_device_add
gpiolib_cdev_register
gpiochip_setup_dev
gpiochip_add_data_with_key
gcdev_register() & gcdev_unregister() would call device_add() &
device_del() (no matter CONFIG_GPIO_CDEV is enabled or not) to
register/unregister device.
However, if device_add() succeeds, some resource (like
struct device_private allocated by device_private_init())
is not released by device_del().
Therefore, after device_add() succeeds by gcdev_register(), it
needs to call put_device() to release resource in the error handle
path.
Here we move forward the register of release function, and let it
release every piece of resource by put_device() instead of kfree().
While at it, fix another subtle issue, i.e. when gc->ngpio is equal
to 0, we still call kcalloc() and, in case of further error, kfree()
on the ZERO_PTR pointer, which is not NULL. It's not a bug per se,
but rather waste of the resources and potentially wrong expectation
about contents of the gdev->descs variable.
### Affected Products
**Linux - Linux**
Affected versions:
- 159f3cd92f17c61a4e2a47456de5865b114ef88e (Status: affected)
- 159f3cd92f17c61a4e2a47456de5865b114ef88e (Status: affected)
- 159f3cd92f17c61a4e2a47456de5865b114ef88e (Status: affected)
**Linux - Linux**
Affected versions:
- 4.6 (Status: affected)
- 0 (Status: unaffected)
- 5.15.83 (Status: unaffected)
- 6.0.13 (Status: unaffected)
- 6.1 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/6daaa84b621485fe28c401be18debf92ae8ef04a)
2. [](https://git.kernel.org/stable/c/371363716398ed718e389bea8c5e9843a79dde4e)
3. [](https://git.kernel.org/stable/c/ec851b23084b3a0af8bf0f5e51d33a8d678bdc49)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-10969, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-10969 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-10969
- **State**: PUBLISHED
- **Published Date**: October 08, 2019 at 18:41 UTC
- **Last Updated**: August 04, 2024 at 22:40 UTC
- **Reserved Date**: April 08, 2019 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Moxa EDR 810, all versions 5.1 and prior, allows an authenticated attacker to abuse the ping feature to execute unauthorized commands on the router, which may allow an attacker to perform remote code execution.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**n/a - Moxa EDR 810**
Affected versions:
- All versions 5.1 and prior (Status: affected)
### References
1. [](https://www.us-cert.gov/ics/advisories/icsa-19-274-03)
2. [](http://packetstormsecurity.com/files/154943/Moxa-EDR-810-Command-Injection-Information-Disclosure.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-6991, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-6991 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6991
- **State**: PUBLISHED
- **Published Date**: August 06, 2024 at 15:37 UTC
- **Last Updated**: August 06, 2024 at 20:04 UTC
- **Reserved Date**: July 22, 2024 at 23:32 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use after free in Dawn in Google Chrome prior to 127.0.6533.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
### Affected Products
**Google - Chrome**
Affected versions:
- 127.0.6533.72 (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop_23.html)
2. [](https://issues.chromium.org/issues/346618785)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2009-0204, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2009-0204 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0204
- **State**: PUBLISHED
- **Published Date**: January 30, 2009 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 04:24 UTC
- **Reserved Date**: January 20, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in HP Select Access 6.1 and 6.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SSRT090007](http://marc.info/?l=bugtraq&m=123324765514459&w=2)
2. [33713](http://secunia.com/advisories/33713)
3. [ADV-2009-0296](http://www.vupen.com/english/advisories/2009/0296)
4. [33505](http://www.securityfocus.com/bid/33505)
5. [selectaccess-unspecified-xss(48334)](https://exchange.xforce.ibmcloud.com/vulnerabilities/48334)
6. [1021641](http://securitytracker.com/id?1021641)
7. [HPSBMA02403](http://marc.info/?l=bugtraq&m=123324765514459&w=2)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2008-5364, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2008-5364 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5364
- **State**: PUBLISHED
- **Published Date**: December 08, 2008 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 10:49 UTC
- **Reserved Date**: December 07, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in the getPlus ActiveX control in gp.ocx 1.2.2.50 in NOS Microsystems getPlus Download Manager, as used for the Adobe Reader 8.1 installation process and other downloads, allows remote attackers to execute arbitrary code via unspecified vectors, a different issue than CVE-2008-4817.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20081104 Multiple Vendor NOS Microsystems getPlus Downloader Stack Buffer Overflow Vulnerability](http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=754)
2. [](http://www.adobe.com/support/security/bulletins/apsb08-19.html)
3. [32105](http://www.securityfocus.com/bid/32105)
4. [ADV-2008-3002](http://www.vupen.com/english/advisories/2008/3002)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-0378, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-0378 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-0378
- **State**: PUBLISHED
- **Published Date**: October 14, 2020 at 13:05 UTC
- **Last Updated**: August 04, 2024 at 06:02 UTC
- **Reserved Date**: October 17, 2019 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In onWnmFrameReceived of PasspointManager.java, there is a missing permission check. This could lead to local information disclosure of location data with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11Android ID: A-157748906
### Affected Products
**n/a - Android**
Affected versions:
- Android-9 Android-10 Android-11 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2020-10-01)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-3065, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-3065 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3065
- **State**: PUBLISHED
- **Published Date**: April 12, 2017 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 14:16 UTC
- **Reserved Date**: December 02, 2016 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable memory corruption vulnerability in the font manipulation functionality. Successful exploitation could lead to arbitrary code execution.
### Affected Products
**n/a - Adobe Acrobat Reader 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier.**
Affected versions:
- Adobe Acrobat Reader 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier. (Status: affected)
### References
1. [1038228](http://www.securitytracker.com/id/1038228)
2. [97556](http://www.securityfocus.com/bid/97556)
3. [](https://helpx.adobe.com/security/products/acrobat/apsb17-11.html)
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.