System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-49959, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-49959 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-49959
- **State**: PUBLISHED
- **Published Date**: October 21, 2024 at 18:02 UTC
- **Last Updated**: May 04, 2025 at 09:42 UTC
- **Reserved Date**: October 21, 2024 at 12:17 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error
In __jbd2_log_wait_for_space(), we might call jbd2_cleanup_journal_tail()
to recover some journal space. But if an error occurs while executing
jbd2_cleanup_journal_tail() (e.g., an EIO), we don't stop waiting for free
space right away, we try other branches, and if j_committing_transaction
is NULL (i.e., the tid is 0), we will get the following complain:
============================================
JBD2: I/O error when updating journal superblock for sdd-8.
__jbd2_log_wait_for_space: needed 256 blocks and only had 217 space available
__jbd2_log_wait_for_space: no way to get more journal space in sdd-8
------------[ cut here ]------------
WARNING: CPU: 2 PID: 139804 at fs/jbd2/checkpoint.c:109 __jbd2_log_wait_for_space+0x251/0x2e0
Modules linked in:
CPU: 2 PID: 139804 Comm: kworker/u8:3 Not tainted 6.6.0+ #1
RIP: 0010:__jbd2_log_wait_for_space+0x251/0x2e0
Call Trace:
<TASK>
add_transaction_credits+0x5d1/0x5e0
start_this_handle+0x1ef/0x6a0
jbd2__journal_start+0x18b/0x340
ext4_dirty_inode+0x5d/0xb0
__mark_inode_dirty+0xe4/0x5d0
generic_update_time+0x60/0x70
[...]
============================================
So only if jbd2_cleanup_journal_tail() returns 1, i.e., there is nothing to
clean up at the moment, continue to try to reclaim free space in other ways.
Note that this fix relies on commit 6f6a6fda2945 ("jbd2: fix ocfs2 corrupt
when updating journal superblock fails") to make jbd2_cleanup_journal_tail
return the correct error code.
### Affected Products
**Linux - Linux**
Affected versions:
- 8c3f25d8950c3e9fe6c9849f88679b3f2a071550 (Status: affected)
- 8c3f25d8950c3e9fe6c9849f88679b3f2a071550 (Status: affected)
- 8c3f25d8950c3e9fe6c9849f88679b3f2a071550 (Status: affected)
- 8c3f25d8950c3e9fe6c9849f88679b3f2a071550 (Status: affected)
- 8c3f25d8950c3e9fe6c9849f88679b3f2a071550 (Status: affected)
- 8c3f25d8950c3e9fe6c9849f88679b3f2a071550 (Status: affected)
- 8c3f25d8950c3e9fe6c9849f88679b3f2a071550 (Status: affected)
- 8c3f25d8950c3e9fe6c9849f88679b3f2a071550 (Status: affected)
- 8c3f25d8950c3e9fe6c9849f88679b3f2a071550 (Status: affected)
**Linux - Linux**
Affected versions:
- 2.6.28 (Status: affected)
- 0 (Status: unaffected)
- 4.19.323 (Status: unaffected)
- 5.4.285 (Status: unaffected)
- 5.10.227 (Status: unaffected)
- 5.15.168 (Status: unaffected)
- 6.1.113 (Status: unaffected)
- 6.6.55 (Status: unaffected)
- 6.10.14 (Status: unaffected)
- 6.11.3 (Status: unaffected)
- 6.12 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/801a35dfef6996f3d5eaa96a59caf00440d9165e)
2. [](https://git.kernel.org/stable/c/d5dc65370a746750dbb2f03eabcf86b18db65f32)
3. [](https://git.kernel.org/stable/c/481e8f18a290e39e04ddb7feb2bb2a2cc3b213ed)
4. [](https://git.kernel.org/stable/c/ec7f8337c98ad281020ad1f11ba492462d80737a)
5. [](https://git.kernel.org/stable/c/70bae48377a2c4296fd3caf4caf8f11079111019)
6. [](https://git.kernel.org/stable/c/1c62dc0d82c62f0dc8fcdc4843208e522acccaf5)
7. [](https://git.kernel.org/stable/c/3ced0fe6c0eff032733ea8b38778b34707270138)
8. [](https://git.kernel.org/stable/c/c6bf043b210eac67d35a114e345c4e5585672913)
9. [](https://git.kernel.org/stable/c/f5cacdc6f2bb2a9bf214469dd7112b43dd2dd68a) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-28329, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-28329 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-28329
- **State**: PUBLISHED
- **Published Date**: March 23, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 12:38 UTC
- **Reserved Date**: March 14, 2023 at 00:00 UTC
- **Assigned By**: fedora
### Vulnerability Description
Insufficient validation of profile field availability condition resulted in an SQL injection risk (by default only available to teachers and managers).
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Unknown - Unknown**
Affected versions:
- 4.1.0 (Status: affected)
- 4.0.0 (Status: affected)
- 3.11.0 (Status: affected)
- 0 (Status: affected)
### References
1. [RHBZ#2179406](https://bugzilla.redhat.com/show_bug.cgi?id=2179406)
2. [FEDORA-2023-d9c13996b2](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QZN34VSF4HTCW3C3ZP2OZYSLYUKADPF/)
3. [](https://moodle.org/mod/forum/discuss.php?d=445061) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-49691, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-49691 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-49691
- **State**: PUBLISHED
- **Published Date**: February 26, 2025 at 02:24 UTC
- **Last Updated**: May 04, 2025 at 08:43 UTC
- **Reserved Date**: February 26, 2025 at 02:21 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
erspan: do not assume transport header is always set
Rewrite tests in ip6erspan_tunnel_xmit() and
erspan_fb_xmit() to not assume transport header is set.
syzbot reported:
WARNING: CPU: 0 PID: 1350 at include/linux/skbuff.h:2911 skb_transport_header include/linux/skbuff.h:2911 [inline]
WARNING: CPU: 0 PID: 1350 at include/linux/skbuff.h:2911 ip6erspan_tunnel_xmit+0x15af/0x2eb0 net/ipv6/ip6_gre.c:963
Modules linked in:
CPU: 0 PID: 1350 Comm: aoe_tx0 Not tainted 5.19.0-rc2-syzkaller-00160-g274295c6e53f #0
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
RIP: 0010:skb_transport_header include/linux/skbuff.h:2911 [inline]
RIP: 0010:ip6erspan_tunnel_xmit+0x15af/0x2eb0 net/ipv6/ip6_gre.c:963
Code: 0f 47 f0 40 88 b5 7f fe ff ff e8 8c 16 4b f9 89 de bf ff ff ff ff e8 a0 12 4b f9 66 83 fb ff 0f 85 1d f1 ff ff e8 71 16 4b f9 <0f> 0b e9 43 f0 ff ff e8 65 16 4b f9 48 8d 85 30 ff ff ff ba 60 00
RSP: 0018:ffffc90005daf910 EFLAGS: 00010293
RAX: 0000000000000000 RBX: 000000000000ffff RCX: 0000000000000000
RDX: ffff88801f032100 RSI: ffffffff882e8d3f RDI: 0000000000000003
RBP: ffffc90005dafab8 R08: 0000000000000003 R09: 000000000000ffff
R10: 000000000000ffff R11: 0000000000000000 R12: ffff888024f21d40
R13: 000000000000a288 R14: 00000000000000b0 R15: ffff888025a2e000
FS: 0000000000000000(0000) GS:ffff88802c800000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b2e425000 CR3: 000000006d099000 CR4: 0000000000152ef0
Call Trace:
<TASK>
__netdev_start_xmit include/linux/netdevice.h:4805 [inline]
netdev_start_xmit include/linux/netdevice.h:4819 [inline]
xmit_one net/core/dev.c:3588 [inline]
dev_hard_start_xmit+0x188/0x880 net/core/dev.c:3604
sch_direct_xmit+0x19f/0xbe0 net/sched/sch_generic.c:342
__dev_xmit_skb net/core/dev.c:3815 [inline]
__dev_queue_xmit+0x14a1/0x3900 net/core/dev.c:4219
dev_queue_xmit include/linux/netdevice.h:2994 [inline]
tx+0x6a/0xc0 drivers/block/aoe/aoenet.c:63
kthread+0x1e7/0x3b0 drivers/block/aoe/aoecmd.c:1229
kthread+0x2e9/0x3a0 kernel/kthread.c:376
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:302
</TASK>
### Affected Products
**Linux - Linux**
Affected versions:
- d5db21a3e6977dcb42cee3d16cd69901fa66510a (Status: affected)
- d5db21a3e6977dcb42cee3d16cd69901fa66510a (Status: affected)
- d5db21a3e6977dcb42cee3d16cd69901fa66510a (Status: affected)
- d5db21a3e6977dcb42cee3d16cd69901fa66510a (Status: affected)
- d5db21a3e6977dcb42cee3d16cd69901fa66510a (Status: affected)
- d5db21a3e6977dcb42cee3d16cd69901fa66510a (Status: affected)
**Linux - Linux**
Affected versions:
- 4.18 (Status: affected)
- 0 (Status: unaffected)
- 4.19.250 (Status: unaffected)
- 5.4.202 (Status: unaffected)
- 5.10.127 (Status: unaffected)
- 5.15.51 (Status: unaffected)
- 5.18.8 (Status: unaffected)
- 5.19 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/fb401f37f6eadf24956d93687e5758c163c0d12b)
2. [](https://git.kernel.org/stable/c/02da602bc2f353dccd9e489a604490034ded941e)
3. [](https://git.kernel.org/stable/c/cec9867ee55478ef5dcb2adf030fe0c442a4c4ee)
4. [](https://git.kernel.org/stable/c/a3b2470399f679587c45abe56e551caf10becca2)
5. [](https://git.kernel.org/stable/c/2c8aeffc7c586d53e1d380f010bdca4f710f2480)
6. [](https://git.kernel.org/stable/c/301bd140ed0b24f0da660874c7e8a47dad8c8222) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-2715, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-2715 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-2715
- **State**: PUBLISHED
- **Published Date**: March 24, 2025 at 22:31 UTC
- **Last Updated**: March 25, 2025 at 13:33 UTC
- **Reserved Date**: March 24, 2025 at 11:38 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as problematic has been found in timschofield webERP up to 5.0.0.rc+13. This affects an unknown part of the file ConfirmDispatch_Invoice.php of the component Confirm Dispatch and Invoice Page. The manipulation of the argument Narrative leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
- CWE-94: Code Injection
### Affected Products
**timschofield - webERP**
Affected versions:
- 5.0.0.rc+13 (Status: affected)
### References
1. [VDB-300735 | timschofield webERP Confirm Dispatch and Invoice Page ConfirmDispatch_Invoice.php cross site scripting](https://vuldb.com/?id.300735)
2. [VDB-300735 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.300735)
3. [Submit #519791 | timschofield WebERP 5.0.0.rc+13 Cross Site Scripting](https://vuldb.com/?submit.519791)
4. [](https://github.com/janssensjelle/published-pocs/blob/main/weberp-xss-confirm-dispatch.md)
### Credits
- Jelle Janssens (VulDB User)
- Jelle Janssens (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-6637, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-6637 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-6637
- **State**: PUBLISHED
- **Published Date**: March 03, 2014 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 21:36 UTC
- **Reserved Date**: February 07, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Apache Cordova 3.3.0 and earlier and Adobe PhoneGap 2.9.0 and earlier do not anchor the end of domain-name regular expressions, which allows remote attackers to bypass a whitelist protection mechanism via a domain name that contains an acceptable name as an initial substring.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.cs.utexas.edu/~shmat/shmat_ndss14nofrak.pdf)
2. [](http://www.internetsociety.org/ndss2014/programme#session3)
3. [20140124 Security Vulnerabilities in Apache Cordova / PhoneGap](http://seclists.org/bugtraq/2014/Jan/96)
4. [](http://labs.mwrinfosecurity.com/blog/2012/04/30/building-android-javajavascript-bridges/)
5. [[oss-security] 20140207 Re: CVE request: multiple issues in Apache Cordova/PhoneGap](http://openwall.com/lists/oss-security/2014/02/07/9)
6. [](http://packetstormsecurity.com/files/124954/apachecordovaphonegap-bypass.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-7304, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-7304 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-7304
- **State**: PUBLISHED
- **Published Date**: February 21, 2018 at 20:00 UTC
- **Last Updated**: September 16, 2024 at 17:57 UTC
- **Reserved Date**: February 21, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tiki 17.1 does not validate user input for special characters; consequently, a CSV Injection attack can open a CMD.EXE or Calculator window on the victim machine to perform malicious activity, as demonstrated by an "=cmd|' /C calc'!A0" payload during User Creation.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://websecnerd.blogspot.in/2018/01/tiki-wiki-cms-groupware-17.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-7675, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-7675 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-7675
- **State**: PUBLISHED
- **Published Date**: September 30, 2024 at 20:30 UTC
- **Last Updated**: January 29, 2025 at 16:39 UTC
- **Reserved Date**: August 10, 2024 at 16:13 UTC
- **Assigned By**: autodesk
### Vulnerability Description
A maliciously crafted DWF file, when parsed in w3dtk.dll through Autodesk Navisworks, can force a Use-After-Free. A malicious actor can leverage this vulnerability to cause a crash or execute arbitrary code in the context of the current process.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Autodesk - Navisworks Freedom**
Affected versions:
- 2025 (Status: affected)
- 2024 (Status: affected)
- 2023 (Status: affected)
- 2022 (Status: affected)
**Autodesk - Navisworks Simulate**
Affected versions:
- 2025 (Status: affected)
- 2024 (Status: affected)
- 2023 (Status: affected)
- 2022 (Status: affected)
**Autodesk - Navisworks Manage**
Affected versions:
- 2025 (Status: affected)
- 2024 (Status: affected)
- 2023 (Status: affected)
- 2022 (Status: affected)
### References
1. [](https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0015) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-3757, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-3757 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-3757
- **State**: PUBLISHED
- **Published Date**: July 17, 2013 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 16:22 UTC
- **Reserved Date**: June 03, 2013 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in Oracle Solaris 8, 9, 10, and 11 allows remote attackers to affect integrity and availability via vectors related to SMF/File Locking Services.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oval:org.mitre.oval:def:19232](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19232)
2. [](http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html)
3. [oracle-cpujuly2013-cve20133757(85695)](https://exchange.xforce.ibmcloud.com/vulnerabilities/85695)
4. [95308](http://osvdb.org/95308)
5. [61263](http://www.securityfocus.com/bid/61263) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-2264, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-2264 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2264
- **State**: PUBLISHED
- **Published Date**: July 22, 2019 at 13:47 UTC
- **Last Updated**: August 04, 2024 at 18:42 UTC
- **Reserved Date**: December 10, 2018 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Null pointer dereference occurs for channel context while opening glink channel in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9607, MDM9640, MSM8909W, QCS405, QCS605, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 712 / SD 710 / SD 670, SD 820A, SD 835, SD 845 / SD 850, SDM439, SDM630, SDM660, SDX24
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables**
Affected versions:
- MDM9607, MDM9640, MSM8909W, QCS405, QCS605, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 712 / SD 710 / SD 670, SD 820A, SD 835, SD 845 / SD 850, SDM439, SDM630, SDM660, SDX24 (Status: affected)
### References
1. [](https://www.codeaurora.org/security-bulletin/2019/06/03/june-2019-code-aurora-security-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-56655, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-56655 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-56655
- **State**: PUBLISHED
- **Published Date**: December 27, 2024 at 15:06 UTC
- **Last Updated**: June 04, 2025 at 12:57 UTC
- **Reserved Date**: December 27, 2024 at 15:00 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: do not defer rule destruction via call_rcu
nf_tables_chain_destroy can sleep, it can't be used from call_rcu
callbacks.
Moreover, nf_tables_rule_release() is only safe for error unwinding,
while transaction mutex is held and the to-be-desroyed rule was not
exposed to either dataplane or dumps, as it deactives+frees without
the required synchronize_rcu() in-between.
nft_rule_expr_deactivate() callbacks will change ->use counters
of other chains/sets, see e.g. nft_lookup .deactivate callback, these
must be serialized via transaction mutex.
Also add a few lockdep asserts to make this more explicit.
Calling synchronize_rcu() isn't ideal, but fixing this without is hard
and way more intrusive. As-is, we can get:
WARNING: .. net/netfilter/nf_tables_api.c:5515 nft_set_destroy+0x..
Workqueue: events nf_tables_trans_destroy_work
RIP: 0010:nft_set_destroy+0x3fe/0x5c0
Call Trace:
<TASK>
nf_tables_trans_destroy_work+0x6b7/0xad0
process_one_work+0x64a/0xce0
worker_thread+0x613/0x10d0
In case the synchronize_rcu becomes an issue, we can explore alternatives.
One way would be to allocate nft_trans_rule objects + one nft_trans_chain
object, deactivate the rules + the chain and then defer the freeing to the
nft destroy workqueue. We'd still need to keep the synchronize_rcu path as
a fallback to handle -ENOMEM corner cases though.
### Affected Products
**Linux - Linux**
Affected versions:
- 9eee6097ffb26cdd2adb988c0d378fa0d650c737 (Status: affected)
- 558f503f707f481bbf40efa74a938b8021df841d (Status: affected)
- a394c160d57f4b083bd904a22802f6fb7f5b3cea (Status: affected)
- e6c32a64d61184c2bdf89442b3d31ef530afba34 (Status: affected)
- bfd05c68e4c6320304e9f371ffa356b6e4b9cc53 (Status: affected)
- c03d278fdf35e73dd0ec543b9b556876b9d9a8dc (Status: affected)
- c03d278fdf35e73dd0ec543b9b556876b9d9a8dc (Status: affected)
- cb401e5799e0acacb405f2128097e9c4ccf82f8a (Status: affected)
**Linux - Linux**
Affected versions:
- 6.12 (Status: affected)
- 0 (Status: unaffected)
- 6.6.67 (Status: unaffected)
- 6.12.6 (Status: unaffected)
- 6.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/5146c27b2780aac59876a887a5f4e793b8949862)
2. [](https://git.kernel.org/stable/c/2991dc357a28b61c13ed1f7b59e9251e2b4562fb)
3. [](https://git.kernel.org/stable/c/b8d8f53e1858178882b881b8c09f94ef0e83bf76)
4. [](https://git.kernel.org/stable/c/b0f013bebf94fe7ae75e5a53be2f2bd1cc1841e3)
5. [](https://git.kernel.org/stable/c/27f0574253f6c24c8ee4e3f0a685b75ed3a256ed)
6. [](https://git.kernel.org/stable/c/7cf0bd232b565d9852cb25fd094f77254773e048)
7. [](https://git.kernel.org/stable/c/b04df3da1b5c6f6dc7cdccc37941740c078c4043) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-14175, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-14175 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-14175
- **State**: REJECTED
- **Published Date**: December 20, 2021 at 22:44 UTC
- **Last Updated**: December 20, 2021 at 22:44 UTC
- **Reserved Date**: July 19, 2019 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-31459, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-31459 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-31459
- **State**: PUBLISHED
- **Published Date**: June 02, 2022 at 21:40 UTC
- **Last Updated**: August 03, 2024 at 07:19 UTC
- **Reserved Date**: May 23, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Owl Labs Meeting Owl 5.2.0.15 allows attackers to retrieve the passcode hash via a certain c 10 value over Bluetooth.
### CVSS Metrics
- **CVSS Base Score**: 7.4/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AC:L/AV:A/A:N/C:H/I:N/PR:N/S:C/UI:N`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://arstechnica.com/information-technology/2022/06/vulnerabilities-in-meeting-owl-videoconference-device-imperil-100k-users/)
2. [](https://www.modzero.com/static/meetingowl/Meeting_Owl_Pro_Security_Disclosure_Report_RELEASE.pdf)
3. [](https://resources.owllabs.com/blog/owl-labs-update) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-12909, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-12909 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-12909
- **State**: PUBLISHED
- **Published Date**: June 27, 2018 at 16:00 UTC
- **Last Updated**: September 17, 2024 at 00:42 UTC
- **Reserved Date**: June 27, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Webgrind 1.5 relies on user input to display a file, which lets anyone view files from the local filesystem (that the webserver user has access to) via an index.php?op=fileviewer&file= URI. NOTE: the vendor indicates that the product is not intended for a "publicly accessible environment.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/jokkedk/webgrind/issues/112) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-4092, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-4092 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4092
- **State**: PUBLISHED
- **Published Date**: June 28, 2013 at 23:00 UTC
- **Last Updated**: September 17, 2024 at 01:41 UTC
- **Reserved Date**: June 11, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The SecureSphere Operations Manager (SOM) Management Server in Imperva SecureSphere 9.0.0.5 allows context-dependent attackers to obtain sensitive information by leveraging the presence of (1) a session ID in the jsessionid field to secsphLogin.jsp or (2) credentials in the j_password parameter to j_acegi_security_check, and reading (a) web-server access logs, (b) web-server Referer logs, or (c) the browser history.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/121861/Imperva-SecureSphere-Operations-Manager-Command-Execution.html)
2. [](http://www.digitalsec.net/stuff/explt+advs/Imperva-SecureSphere.OptMgr.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-21303, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-21303 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21303
- **State**: PUBLISHED
- **Published Date**: February 05, 2021 at 21:40 UTC
- **Last Updated**: August 03, 2024 at 18:09 UTC
- **Reserved Date**: December 22, 2020 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Helm is open-source software which is essentially "The Kubernetes Package Manager". Helm is a tool for managing Charts. Charts are packages of pre-configured Kubernetes resources. In Helm from version 3.0 and before version 3.5.2, there a few cases where data loaded from potentially untrusted sources was not properly sanitized. When a SemVer in the `version` field of a chart is invalid, in some cases Helm allows the string to be used "as is" without sanitizing. Helm fails to properly sanitized some fields present on Helm repository `index.yaml` files. Helm does not properly sanitized some fields in the `plugin.yaml` file for plugins In some cases, Helm does not properly sanitize the fields in the `Chart.yaml` file. By exploiting these attack vectors, core maintainers were able to send deceptive information to a terminal screen running the `helm` command, as well as obscure or alter information on the screen. In some cases, we could send codes that terminals used to execute higher-order logic, like clearing a terminal screen. Further, during evaluation, the Helm maintainers discovered a few other fields that were not properly sanitized when read out of repository index files. This fix remedies all such cases, and once again enforces SemVer2 policies on version fields. All users of the Helm 3 should upgrade to the fixed version 3.5.2 or later. Those who use Helm as a library should verify that they either sanitize this data on their own, or use the proper Helm API calls to sanitize the data.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N`
### Weakness Classification (CWE)
- CWE-74: Security Weakness
### Affected Products
**helm - helm**
Affected versions:
- > 3.0, < 3.5.2 (Status: affected)
### References
1. [](https://github.com/helm/helm/security/advisories/GHSA-c38g-469g-cmgx)
2. [](https://github.com/helm/helm/commit/6ce9ba60b73013857e2e7c73d3f86ed70bc1ac9a)
3. [](https://github.com/helm/helm/releases/tag/v3.5.2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-16148, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-16148 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-16148
- **State**: PUBLISHED
- **Published Date**: September 09, 2019 at 12:20 UTC
- **Last Updated**: August 05, 2024 at 01:10 UTC
- **Reserved Date**: September 09, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Sakai through 12.6 allows XSS via a chat user name.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/sakaiproject/sakai/pull/6971) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-48928, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-48928 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-48928
- **State**: PUBLISHED
- **Published Date**: December 08, 2023 at 00:00 UTC
- **Last Updated**: May 27, 2025 at 15:30 UTC
- **Reserved Date**: November 20, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Franklin Fueling Systems System Sentinel AnyWare (SSA) version 1.6.24.492 is vulnerable to Open Redirect. The 'path' parameter of the prefs.asp resource allows an attacker to redirect a victim user to an arbitrary web site using a crafted URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/MatJosephs/CVEs/tree/main/CVE-2023-48928) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-10934, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-10934 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-10934
- **State**: PUBLISHED
- **Published Date**: March 27, 2019 at 12:20 UTC
- **Last Updated**: August 05, 2024 at 07:54 UTC
- **Reserved Date**: May 09, 2018 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A cross-site scripting (XSS) vulnerability was found in the JBoss Management Console versions before 7.1.6.CR1, 7.1.6.GA. Users with roles that can create objects in the application can exploit this to attack other privileged users.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Red Hat - wildfly-core**
Affected versions:
- 7.1.6.CR1 (Status: affected)
- 7.1.6.GA (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10934)
2. [RHSA-2019:1160](https://access.redhat.com/errata/RHSA-2019:1160)
3. [RHSA-2019:1162](https://access.redhat.com/errata/RHSA-2019:1162)
4. [RHSA-2019:1159](https://access.redhat.com/errata/RHSA-2019:1159)
5. [RHSA-2019:1161](https://access.redhat.com/errata/RHSA-2019:1161)
6. [](https://security.netapp.com/advisory/ntap-20190611-0002/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-30428, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-30428 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-30428
- **State**: PUBLISHED
- **Published Date**: March 31, 2025 at 22:22 UTC
- **Last Updated**: April 03, 2025 at 20:14 UTC
- **Reserved Date**: March 22, 2025 at 00:04 UTC
- **Assigned By**: apple
### Vulnerability Description
This issue was addressed through improved state management. This issue is fixed in iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6. Photos in the Hidden Photos Album may be viewed without authentication.
### Affected Products
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - iPadOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/122371)
2. [](https://support.apple.com/en-us/122372) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-13723, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-13723 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-13723
- **State**: REJECTED
- **Published Date**: January 14, 2022 at 17:27 UTC
- **Last Updated**: January 14, 2022 at 17:27 UTC
- **Reserved Date**: June 01, 2020 at 00:00 UTC
- **Assigned By**: SWI
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-4207, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-4207 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4207
- **State**: PUBLISHED
- **Published Date**: August 08, 2007 at 01:52 UTC
- **Last Updated**: August 07, 2024 at 14:46 UTC
- **Reserved Date**: August 07, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in admin_console/index.asp in Gallery In A Box allows remote attackers to execute arbitrary SQL commands via the (1) Username or (2) Password field. NOTE: these fields might be associated with the txtUsername and txtPassword parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2007-2798](http://www.vupen.com/english/advisories/2007/2798)
2. [galleryinabox-index-sql-injection(35791)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35791)
3. [2977](http://securityreason.com/securityalert/2977)
4. [36284](http://osvdb.org/36284)
5. [25194](http://www.securityfocus.com/bid/25194)
6. [20070802 [Aria-Security.Net] Gallery In A Box Username & Password Parameters SQL Injection](http://www.securityfocus.com/archive/1/475448/100/0/threaded)
7. [](http://outlaw.aria-security.info/?p=13)
8. [26334](http://secunia.com/advisories/26334) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-0728, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-0728 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-0728
- **State**: PUBLISHED
- **Published Date**: February 21, 2025 at 08:16 UTC
- **Last Updated**: February 21, 2025 at 14:12 UTC
- **Reserved Date**: January 27, 2025 at 08:46 UTC
- **Assigned By**: eclipse
### Vulnerability Description
In NetX HTTP server functionality of Eclipse ThreadX NetX Duo before
version 6.4.2, an attacker can cause an integer underflow and a
subsequent denial of service by writing a very large file, by specially
crafted packets with Content-Length smaller than the data request size. A
possible workaround is to disable HTTP PUT support.
### Weakness Classification (CWE)
- CWE-191: Security Weakness
### Affected Products
**Eclipse Foundation - ThreadX**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://github.com/eclipse-threadx/netxduo/commit/c78d650be7377aae1a8704bc0ce5cc6f9f189014)
2. [](https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-hqp7-4q26-6wqf)
### Credits
- Kelly Patterson of Cisco Talos |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-5339, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-5339 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-5339
- **State**: PUBLISHED
- **Published Date**: April 18, 2018 at 08:00 UTC
- **Last Updated**: August 05, 2024 at 05:33 UTC
- **Reserved Date**: January 11, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Zoho ManageEngine Desktop Central 10.0.124 and 10.0.184: insufficient enforcement of database query type restrictions.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.manageengine.com/products/desktop-central/query-restriction-bypass-vulnerability.html)
2. [](https://www.nccgroup.trust/uk/our-research/technical-advisory-multiple-vulnerabilities-in-manageengine-desktop-central/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-1367, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-1367 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1367
- **State**: PUBLISHED
- **Published Date**: March 23, 2006 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 17:12 UTC
- **Reserved Date**: March 23, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Motorola PEBL U6 08.83.76R, the Motorola V600, and possibly the Motorola E398 and other Motorola P2K-based phones does not require pairing for a connection related to the Headset Audio Gateway service, which allows user-assisted remote attackers to obtain AT level access and view phonebook entries and saved SMS messages by connecting on Bluetooth channel 3 and tricking the user into pressing Grant, aka a "Blueline" attack. NOTE: while user-assisted, the attack is made more feasible because of a GUI misrepresentation issue that allows a default message to be replaced by an attacker-specified one.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20060321 DMA[2006-0321a] - 'Motorola P2K Platform setpath() overflow and Blueline attack'](http://www.securityfocus.com/archive/1/428431/100/0/threaded)
2. [motorola-peblu6-v600-name-spoofing(25402)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25402)
3. [19319](http://secunia.com/advisories/19319)
4. [17190](http://www.securityfocus.com/bid/17190)
5. [](http://www.digitalmunition.com/DMA%5B2006-0321a%5D.txt)
6. [ADV-2006-1045](http://www.vupen.com/english/advisories/2006/1045)
7. [20060321 DMA[2006-0321a] - 'Motorola P2K Platform setpath() overflow and Blueline attack'](http://lists.grok.org.uk/pipermail/full-disclosure/2006-March/044287.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-5648, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-5648 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-5648
- **State**: PUBLISHED
- **Published Date**: July 09, 2024 at 08:33 UTC
- **Last Updated**: August 01, 2024 at 21:18 UTC
- **Reserved Date**: June 04, 2024 at 21:49 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The LearnDash LMS – Reports plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on several functions in all versions up to, and including, 1.8.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update various plugin settings.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L`
### Affected Products
**stellarwp - LearnDash LMS – Reports**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/7fbbd0d7-882f-4bc8-a67a-4d6dc05cb796?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/wisdm-reports-for-learndash/trunk/includes/admin/class-admin-functions.php#L52)
3. [](https://plugins.trac.wordpress.org/browser/wisdm-reports-for-learndash/trunk/includes/admin/class-admin-functions.php#L261)
4. [](https://plugins.trac.wordpress.org/browser/wisdm-reports-for-learndash/trunk/includes/admin/class-admin-functions.php#L284)
5. [](https://plugins.trac.wordpress.org/browser/wisdm-reports-for-learndash/trunk/includes/admin/class-admin-functions.php#L423)
6. [](https://plugins.trac.wordpress.org/browser/wisdm-reports-for-learndash/trunk/includes/admin/class-admin-functions.php#L455)
### Credits
- Lucio Sá |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-0259, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-0259 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-0259
- **State**: PUBLISHED
- **Published Date**: February 15, 2019 at 18:00 UTC
- **Last Updated**: August 04, 2024 at 17:44 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
SAP BusinessObjects, versions 4.2 and 4.3, (Visual Difference) allows an attacker to upload any file (including script files) without proper file format validation.
### Affected Products
**SAP SE - SAP BusinessObjects Business Intelligence Platform Servers (Enterprise)**
Affected versions:
- < 4.2 (Status: affected)
- < 4.3 (Status: affected)
### References
1. [106997](http://www.securityfocus.com/bid/106997)
2. [](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=510922943)
3. [](https://launchpad.support.sap.com/#/notes/2727564) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-51190, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-51190 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-51190
- **State**: PUBLISHED
- **Published Date**: November 11, 2024 at 00:00 UTC
- **Last Updated**: November 12, 2024 at 01:58 UTC
- **Reserved Date**: October 28, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TRENDnet TEW-651BR 2.04B1, TEW-652BRP 3.04b01, and TEW-652BRU 1.00b12 devices contain a Store Cross-site scripting (XSS) vulnerability via the ptRule_ApplicationName_1.1.6.0.0 parameter on the /special_ap.htm page.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.trendnet.com/products/product-detail?prod=245_TEW-652BRU)
2. [](https://www.trendnet.com/products/product-detail?prod=235_TEW-651BR)
3. [](https://www.trendnet.com/products/product-detail?prod=235_TEW-652BRP)
4. [](https://github.com/4hsien/CVE-vulns/blob/main/TRENDnet/TEW-652BRP/XSS_Special_AP/README.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-11626, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-11626 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-11626
- **State**: PUBLISHED
- **Published Date**: May 31, 2018 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 08:17 UTC
- **Reserved Date**: May 31, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SELA (aka SimplE Lossless Audio) v0.1.2-alpha has a stack-based buffer overflow in the core/apev2.c init_apev2_keys function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/sahaRatul/sela/issues/12) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-28382, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-28382 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-28382
- **State**: PUBLISHED
- **Published Date**: June 08, 2022 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 05:56 UTC
- **Reserved Date**: April 03, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in certain Verbatim drives through 2022-03-31. Due to the use of an insecure encryption AES mode (Electronic Codebook, aka ECB), an attacker may be able to extract information even from encrypted data, for example by observing repeating byte patterns. The firmware of the USB-to-SATA bridge controller INIC-3637EN uses AES-256 with the ECB mode. This operation mode of block ciphers (e.g., AES) always encrypts identical plaintext data, in this case blocks of 16 bytes, to identical ciphertext data. For some data, for instance bitmap images, the lack of the cryptographic property called diffusion, within ECB, can leak sensitive information even in encrypted data. Thus, the use of the ECB operation mode can put the confidentiality of specific information at risk, even in an encrypted form. This affects Keypad Secure USB 3.2 Gen 1 Drive Part Number #49428, Store 'n' Go Secure Portable HDD GD25LK01-3637-C VER4.0, Executive Fingerprint Secure SSD GDMSFE01-INI3637-C VER1.1, and Fingerprint Secure Portable Hard Drive Part Number #53650.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-002.txt)
2. [](https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-006.txt)
3. [](https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-010.txt)
4. [](https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-015.txt)
5. [20220610 [SYSS-2022-006]: Verbatim Store 'n' Go Secure Portable HDD - Use of a Cryptographic Primitive with a Risky Implementation (CWE-1240) (CVE-2022-28382)](http://seclists.org/fulldisclosure/2022/Jun/18)
6. [20220610 [SYSS-2022-010]: Verbatim Executive Fingerprint Secure SSD - Use of a Cryptographic Primitive with a Risky Implementation (CWE-1240) (CVE-2022-28382)](http://seclists.org/fulldisclosure/2022/Jun/22)
7. [20220610 [SYSS-2022-002]: Verbatim Keypad Secure USB 3.2 Gen 1 Drive - Use of a Cryptographic Primitive with a Risky Implementation (CWE-1240) (CVE-2022-28382)](http://seclists.org/fulldisclosure/2022/Jun/9)
8. [20220610 [SYSS-2022-015]: Verbatim Fingerprint Secure Portable Hard Drive - Use of a Cryptographic Primitive with a Risky Implementation (CWE-1240) (CVE-2022-28382)](http://seclists.org/fulldisclosure/2022/Jun/24)
9. [](http://packetstormsecurity.com/files/167491/Verbatim-Keypad-Secure-USB-3.2-Gen-1-Drive-ECB-Issue.html)
10. [](http://packetstormsecurity.com/files/167500/Verbatim-Store-N-Go-Secure-Portable-HDD-GD25LK01-3637-C-VER4.0-Risky-Crypto.html)
11. [](http://packetstormsecurity.com/files/167532/Verbatim-Fingerprint-Secure-Portable-Hard-Drive-53650-Risky-Crypto.html)
12. [](http://packetstormsecurity.com/files/167528/Verbatim-Executive-Fingerprint-Secure-SSD-GDMSFE01-INI3637-C-VER1.1-Risky-Crypto.html)
13. [](https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2022-044.txt)
14. [20221008 [SYSS-2022-044]: Verbatim Store 'n' Go Secure Portable SSD - Use of a Cryptographic Primitive with a Risky Implementation (CWE-1240) (CVE-2022-28382)](http://seclists.org/fulldisclosure/2022/Oct/4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-0878, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-0878 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0878
- **State**: PUBLISHED
- **Published Date**: November 23, 2013 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 14:41 UTC
- **Reserved Date**: January 07, 2013 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
The advance_line function in libavcodec/targa.c in FFmpeg before 1.1.3 allows remote attackers to have an unspecified impact via crafted Targa image data, related to an out-of-bounds array access.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.ffmpeg.org/security.html)
2. [GLSA-201603-06](https://security.gentoo.org/glsa/201603-06)
3. [](http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=f5955d9f6f9ffdb81864c3de1c7b801782a55725) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-5918, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-5918 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-5918
- **State**: PUBLISHED
- **Published Date**: November 19, 2012 at 11:00 UTC
- **Last Updated**: September 16, 2024 at 22:30 UTC
- **Reserved Date**: November 18, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
razorCMS 1.2 allows remote authenticated users to access administrator directories and files by creating and deleting a directory.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [18344](http://www.exploit-db.com/exploits/18344) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1002004, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1002004 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1002004
- **State**: PUBLISHED
- **Published Date**: December 03, 2018 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 12:47 UTC
- **Reserved Date**: December 03, 2018 at 00:00 UTC
- **Assigned By**: larry_cashdollar
### Vulnerability Description
There is a reflected XSS vulnerability in WordPress Arigato Autoresponder and News letter v2.5.1.8 This vulnerability requires administrative privileges to exploit.
### Affected Products
**Kiboko Labs https://calendarscripts.info/ - Arigato Autoresponder and Newsletter**
Affected versions:
- unspecified (Status: affected)
### References
1. [45434](https://www.exploit-db.com/exploits/45434/)
2. [](https://wordpress.org/plugins/bft-autoresponder/)
3. [](http://www.vapidlabs.com/advisory.php?v=203) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-37346, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-37346 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-37346
- **State**: PUBLISHED
- **Published Date**: June 20, 2024 at 16:51 UTC
- **Last Updated**: August 02, 2024 at 03:50 UTC
- **Reserved Date**: June 05, 2024 at 21:07 UTC
- **Assigned By**: Absolute
### Vulnerability Description
There is an insufficient input validation vulnerability in
the Warehouse component of Absolute Secure Access prior to 13.06. Attackers
with system administrator permissions can impair the availability of certain
elements of the Secure Access administrative UI by writing invalid data to the
warehouse over the network. There is no loss of warehouse integrity or
confidentiality, the security scope is unchanged. Loss of availability is high.
### CVSS Metrics
- **CVSS Base Score**: 4.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Absolute Software - Secure Access**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.absolute.com/platform/security-information/vulnerability-archive/secure-access-1306/cve-2024-37346/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-6409, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-6409 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6409
- **State**: PUBLISHED
- **Published Date**: September 24, 2016 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 01:29 UTC
- **Reserved Date**: July 26, 2016 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
The Data in Motion (DMo) component in Cisco IOS 15.6(1)T and IOS XE, when the IOx feature set is enabled, allows remote attackers to cause a denial of service (out-of-bounds access) via crafted traffic, aka Bug ID CSCuy54015.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1036875](http://www.securitytracker.com/id/1036875)
2. [93094](http://www.securityfocus.com/bid/93094)
3. [20160921 Cisco IOS and IOS XE Software Data in Motion Component Denial of Service Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160921-dmo) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2457, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2457 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2457
- **State**: PUBLISHED
- **Published Date**: May 27, 2008 at 14:00 UTC
- **Last Updated**: August 07, 2024 at 09:05 UTC
- **Reserved Date**: May 27, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in jokes_category.php in PHP-Jokesite 2.0 allows remote attackers to execute arbitrary SQL commands via the cat_id parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [5660](https://www.exploit-db.com/exploits/5660)
2. [29308](http://www.securityfocus.com/bid/29308)
3. [ADV-2008-1592](http://www.vupen.com/english/advisories/2008/1592/references)
4. [phpjokesite-jokescategory-sql-injection(42554)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42554)
5. [30314](http://secunia.com/advisories/30314) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-12831, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-12831 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-12831
- **State**: PUBLISHED
- **Published Date**: May 13, 2020 at 17:42 UTC
- **Last Updated**: August 04, 2024 at 12:04 UTC
- **Reserved Date**: May 13, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in FRRouting FRR (aka Free Range Routing) through 7.3.1. When using the split-config feature, the init script creates an empty config file with world-readable default permissions, leading to a possible information leak via tools/frr.in and tools/frrcommon.sh.in. NOTE: some parties consider this user error, not a vulnerability, because the permissions are under the control of the user before any sensitive information is present in the file
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1830805)
2. [](https://github.com/FRRouting/frr/pull/6383) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-3569, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-3569 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3569
- **State**: PUBLISHED
- **Published Date**: April 24, 2017 at 19:00 UTC
- **Last Updated**: October 07, 2024 at 16:11 UTC
- **Reserved Date**: December 06, 2016 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Hospitality OPERA 5 Property Services component of Oracle Hospitality Applications (subcomponent: OPERA Business Events). Supported versions that are affected are 5.4.0.x, 5.4.1.x, 5.4.2.x, 5.4.3.x, 5.5.0.x and 5.5.1.x. Easily "exploitable" vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hospitality OPERA 5 Property Services. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Hospitality OPERA 5 Property Services accessible data as well as unauthorized read access to a subset of Oracle Hospitality OPERA 5 Property Services accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).
### Affected Products
**Oracle Corporation - Hospitality OPERA 5 Property Services**
Affected versions:
- 5.4.0.x (Status: affected)
- 5.4.1.x (Status: affected)
- 5.4.2.x (Status: affected)
- 5.4.3.x (Status: affected)
- 5.5.0.x (Status: affected)
- 5.5.1.x (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html)
2. [97841](http://www.securityfocus.com/bid/97841) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-2845, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-2845 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-2845
- **State**: PUBLISHED
- **Published Date**: May 22, 2013 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 15:52 UTC
- **Reserved Date**: April 11, 2013 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
The Web Audio implementation in Google Chrome before 27.0.1453.93 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oval:org.mitre.oval:def:16354](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16354)
2. [](https://code.google.com/p/chromium/issues/detail?id=188092)
3. [DSA-2695](http://www.debian.org/security/2013/dsa-2695)
4. [](https://code.google.com/p/chromium/issues/detail?id=222136)
5. [](http://googlechromereleases.blogspot.com/2013/05/stable-channel-release.html)
6. [](https://code.google.com/p/chromium/issues/detail?id=179522) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-6967, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-6967 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6967
- **State**: PUBLISHED
- **Published Date**: July 22, 2024 at 02:31 UTC
- **Last Updated**: August 01, 2024 at 21:45 UTC
- **Reserved Date**: July 21, 2024 at 15:16 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in SourceCodester Employee and Visitor Gate Pass Logging System 1.0. It has been classified as critical. This affects an unknown part of the file /employee_gatepass/admin/?page=employee/manage_employee. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-272121 was assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**SourceCodester - Employee and Visitor Gate Pass Logging System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-272121 | SourceCodester Employee and Visitor Gate Pass Logging System sql injection](https://vuldb.com/?id.272121)
2. [VDB-272121 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.272121)
3. [Submit #378101 | sourcecodester Employee and Visitor Gate Pass Logging System v1.0 SQL injection](https://vuldb.com/?submit.378101)
4. [](https://github.com/rtsjx-cve/cve/blob/main/sql.md)
### Credits
- rtsjx (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1000039, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1000039 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1000039
- **State**: PUBLISHED
- **Published Date**: May 24, 2018 at 13:00 UTC
- **Last Updated**: August 05, 2024 at 12:33 UTC
- **Reserved Date**: February 02, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Artifex MuPDF 1.12.0 and earlier, multiple heap use after free bugs in the PDF parser could allow an attacker to execute arbitrary code, read memory, or cause a denial of service via a crafted file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [GLSA-201811-15](https://security.gentoo.org/glsa/201811-15)
2. [](http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=4dcc6affe04368461310a21238f7e1871a752a05%3Bhp=8ec561d1bccc46e9db40a9f61310cd8b3763914e)
3. [](http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=71ceebcf56e682504da22c4035b39a2d451e8ffd%3Bhp=7f82c01523505052615492f8e220f4348ba46995)
4. [](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5492)
5. [](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5521)
6. [](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5604)
7. [](http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=f597300439e62f5e921f0d7b1e880b5c1a1f1607%3Bhp=093fc3b098dc5fadef5d8ad4b225db9fb124758b)
8. [](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5513)
9. [](https://bugs.ghostscript.com/show_bug.cgi?id=698883)
10. [](https://bugs.ghostscript.com/show_bug.cgi?id=698888)
11. [](https://bugs.ghostscript.com/show_bug.cgi?id=698891)
12. [](https://bugs.ghostscript.com/show_bug.cgi?id=698892)
13. [](https://bugs.ghostscript.com/show_bug.cgi?id=698901) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-40610, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-40610 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-40610
- **State**: PUBLISHED
- **Published Date**: June 09, 2022 at 12:04 UTC
- **Last Updated**: August 04, 2024 at 02:44 UTC
- **Reserved Date**: September 07, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Emlog Pro v 1.0.4 cross-site scripting (XSS) in Emlog Pro background management.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/blackQvQ/emlog/issues/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-48983, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-48983 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-48983
- **State**: PUBLISHED
- **Published Date**: October 21, 2024 at 20:06 UTC
- **Last Updated**: May 04, 2025 at 08:27 UTC
- **Reserved Date**: August 22, 2024 at 01:27 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
io_uring: Fix a null-ptr-deref in io_tctx_exit_cb()
Syzkaller reports a NULL deref bug as follows:
BUG: KASAN: null-ptr-deref in io_tctx_exit_cb+0x53/0xd3
Read of size 4 at addr 0000000000000138 by task file1/1955
CPU: 1 PID: 1955 Comm: file1 Not tainted 6.1.0-rc7-00103-gef4d3ea40565 #75
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.11.0-2.el7 04/01/2014
Call Trace:
<TASK>
dump_stack_lvl+0xcd/0x134
? io_tctx_exit_cb+0x53/0xd3
kasan_report+0xbb/0x1f0
? io_tctx_exit_cb+0x53/0xd3
kasan_check_range+0x140/0x190
io_tctx_exit_cb+0x53/0xd3
task_work_run+0x164/0x250
? task_work_cancel+0x30/0x30
get_signal+0x1c3/0x2440
? lock_downgrade+0x6e0/0x6e0
? lock_downgrade+0x6e0/0x6e0
? exit_signals+0x8b0/0x8b0
? do_raw_read_unlock+0x3b/0x70
? do_raw_spin_unlock+0x50/0x230
arch_do_signal_or_restart+0x82/0x2470
? kmem_cache_free+0x260/0x4b0
? putname+0xfe/0x140
? get_sigframe_size+0x10/0x10
? do_execveat_common.isra.0+0x226/0x710
? lockdep_hardirqs_on+0x79/0x100
? putname+0xfe/0x140
? do_execveat_common.isra.0+0x238/0x710
exit_to_user_mode_prepare+0x15f/0x250
syscall_exit_to_user_mode+0x19/0x50
do_syscall_64+0x42/0xb0
entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0023:0x0
Code: Unable to access opcode bytes at 0xffffffffffffffd6.
RSP: 002b:00000000fffb7790 EFLAGS: 00000200 ORIG_RAX: 000000000000000b
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
</TASK>
Kernel panic - not syncing: panic_on_warn set ...
This happens because the adding of task_work from io_ring_exit_work()
isn't synchronized with canceling all work items from eg exec. The
execution of the two are ordered in that they are both run by the task
itself, but if io_tctx_exit_cb() is queued while we're canceling all
work items off exec AND gets executed when the task exits to userspace
rather than in the main loop in io_uring_cancel_generic(), then we can
find current->io_uring == NULL and hit the above crash.
It's safe to add this NULL check here, because the execution of the two
paths are done by the task itself.
[axboe: add code comment and also put an explanation in the commit msg]
### Affected Products
**Linux - Linux**
Affected versions:
- d56d938b4bef3e1421a42023cdcd6e13c1f50831 (Status: affected)
- d56d938b4bef3e1421a42023cdcd6e13c1f50831 (Status: affected)
- d56d938b4bef3e1421a42023cdcd6e13c1f50831 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.12 (Status: affected)
- 0 (Status: unaffected)
- 5.15.83 (Status: unaffected)
- 6.0.13 (Status: unaffected)
- 6.1 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/f895511de9d27fff71dad2c234ad53b4afd2b06c)
2. [](https://git.kernel.org/stable/c/d91edca1943453aaaba4f380f6f364346222e5cf)
3. [](https://git.kernel.org/stable/c/998b30c3948e4d0b1097e639918c5cff332acac5) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-3807, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-3807 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-3807
- **State**: PUBLISHED
- **Published Date**: April 19, 2025 at 17:00 UTC
- **Last Updated**: April 21, 2025 at 02:27 UTC
- **Reserved Date**: April 18, 2025 at 14:30 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, was found in zhenfeng13 My-BBS 1.0. This affects the function Upload of the file src/main/java/com/my/bbs/controller/common/UploadController.java of the component Endpoint. The manipulation leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
- CWE-284: Security Weakness
### Affected Products
**zhenfeng13 - My-BBS**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-305661 | zhenfeng13 My-BBS Endpoint UploadController.java upload unrestricted upload](https://vuldb.com/?id.305661)
2. [VDB-305661 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.305661)
3. [Submit #555258 | https://github.com/ZHENFENG13/My-BBS My-BBS 1.0 Unrestricted Upload of File with Dangerous Type](https://vuldb.com/?submit.555258)
4. [](https://github.com/caigo8/CVE-md/blob/main/My-bbs/%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0.md)
### Credits
- Caigo (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0516, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0516 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0516
- **State**: PUBLISHED
- **Published Date**: June 21, 2021 at 16:01 UTC
- **Last Updated**: August 03, 2024 at 15:40 UTC
- **Reserved Date**: November 06, 2020 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In p2p_process_prov_disc_req of p2p_pd.c, there is a possible out of bounds read and write due to a use after free. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-181660448
### Affected Products
**n/a - Android**
Affected versions:
- Android-11 Android-8.1 Android-9 Android-10 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2021-06-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-4434, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-4434 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4434
- **State**: PUBLISHED
- **Published Date**: September 29, 2017 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 00:32 UTC
- **Reserved Date**: May 02, 2016 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Apache Tika before 1.13 does not properly initialize the XML parser or choose handlers, which might allow remote attackers to conduct XML External Entity (XXE) attacks via vectors involving (1) spreadsheets in OOXML files and (2) XMP metadata in PDF and other file formats, a related issue to CVE-2016-2175.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20160526 [CVE-2016-4434] Apache Tika XML External Entity vulnerability](http://www.securityfocus.com/archive/1/538500/100/0/threaded)
2. [[tika-dev] 20160526 [CVE-2016-4434] Apache Tika XML External Entity vulnerability](https://mail-archives.apache.org/mod_mbox/tika-dev/201605.mbox/%3C1705136517.1175366.1464278135251.JavaMail.yahoo%40mail.yahoo.com%3E)
3. [RHSA-2017:0272](http://rhn.redhat.com/errata/RHSA-2017-0272.html)
4. [RHSA-2017:0248](http://rhn.redhat.com/errata/RHSA-2017-0248.html)
5. [RHSA-2017:0249](http://rhn.redhat.com/errata/RHSA-2017-0249.html)
6. [[lucene-solr-user] 20190104 Re: SOLR v7 Security Issues Caused Denial of Use - Sonatype Application Composition Report](https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-5476, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-5476 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5476
- **State**: REJECTED
- **Published Date**: January 25, 2021 at 17:53 UTC
- **Last Updated**: January 25, 2021 at 17:53 UTC
- **Reserved Date**: January 03, 2020 at 00:00 UTC
- **Assigned By**: pivotal
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-1159, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-1159 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-1159
- **State**: PUBLISHED
- **Published Date**: September 01, 2004 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 03:19 UTC
- **Reserved Date**: September 26, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Canna 3.6 and earlier does not properly validate requests, which allows remote attackers to cause a denial of service or information leak.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-224](http://www.debian.org/security/2003/dsa-224)
2. [6354](http://www.securityfocus.com/bid/6354)
3. [RHSA-2002:246](http://www.redhat.com/support/errata/RHSA-2002-246.html)
4. [RHSA-2002:261](http://www.redhat.com/support/errata/RHSA-2002-261.html)
5. [canna-improper-request-validation(10832)](https://exchange.xforce.ibmcloud.com/vulnerabilities/10832)
6. [RHSA-2003:115](http://www.redhat.com/support/errata/RHSA-2003-115.html)
7. [](http://canna.sourceforge.jp/sec/Canna-2002-01.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1554, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1554 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1554
- **State**: PUBLISHED
- **Published Date**: November 01, 2017 at 21:00 UTC
- **Last Updated**: September 17, 2024 at 00:16 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Infosphere BigInsights 4.2.0 and 4.2.5 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim. IBM X-Force ID: 131398.
### Affected Products
**IBM - BigInsights**
Affected versions:
- 4.2.0 (Status: affected)
- 4.2.5 (Status: affected)
### References
1. [](http://www.ibm.com/support/docview.wss?uid=swg22009192)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/131398)
3. [101588](http://www.securityfocus.com/bid/101588) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5392, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5392 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5392
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: December 08, 2008 at 00:00 UTC
- **Assigned By**: hp
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-24450, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-24450 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-24450
- **State**: PUBLISHED
- **Published Date**: February 17, 2021 at 13:47 UTC
- **Last Updated**: August 04, 2024 at 15:12 UTC
- **Reserved Date**: August 19, 2020 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Improper conditions check in some Intel(R) Graphics Drivers before versions 26.20.100.8141, 15.45.32.5145 and 15.40.46.5144 may allow an authenticated user to potentially enable escalation of privilege via local access.
### Affected Products
**n/a - Intel(R) Graphics Drivers**
Affected versions:
- before versions 26.20.100.8141, 15.45.32.5145 and 15.40.46.5144 (Status: affected)
### References
1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-30483, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-30483 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-30483
- **State**: PUBLISHED
- **Published Date**: March 29, 2024 at 13:03 UTC
- **Last Updated**: August 02, 2024 at 01:38 UTC
- **Reserved Date**: March 27, 2024 at 10:20 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Simple Sponsorships Sponsors allows Stored XSS.This issue affects Sponsors: from n/a through 3.5.1.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Simple Sponsorships - Sponsors**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/wp-sponsors/wordpress-sponsors-plugin-3-5-1-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Ray Wilson (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-57947, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-57947 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-57947
- **State**: PUBLISHED
- **Published Date**: January 23, 2025 at 13:54 UTC
- **Last Updated**: May 04, 2025 at 10:07 UTC
- **Reserved Date**: January 19, 2025 at 11:50 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_set_pipapo: fix initial map fill
The initial buffer has to be inited to all-ones, but it must restrict
it to the size of the first field, not the total field size.
After each round in the map search step, the result and the fill map
are swapped, so if we have a set where f->bsize of the first element
is smaller than m->bsize_max, those one-bits are leaked into future
rounds result map.
This makes pipapo find an incorrect matching results for sets where
first field size is not the largest.
Followup patch adds a test case to nft_concat_range.sh selftest script.
Thanks to Stefano Brivio for pointing out that we need to zero out
the remainder explicitly, only correcting memset() argument isn't enough.
### Affected Products
**Linux - Linux**
Affected versions:
- 3c4287f62044a90e73a561aa05fc46e62da173da (Status: affected)
- 3c4287f62044a90e73a561aa05fc46e62da173da (Status: affected)
- 3c4287f62044a90e73a561aa05fc46e62da173da (Status: affected)
- 3c4287f62044a90e73a561aa05fc46e62da173da (Status: affected)
- 3c4287f62044a90e73a561aa05fc46e62da173da (Status: affected)
**Linux - Linux**
Affected versions:
- 5.6 (Status: affected)
- 0 (Status: unaffected)
- 5.15.165 (Status: unaffected)
- 6.1.103 (Status: unaffected)
- 6.6.44 (Status: unaffected)
- 6.10.3 (Status: unaffected)
- 6.11 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/957a4d1c4c5849e4515c9fb4db21bf85318103dc)
2. [](https://git.kernel.org/stable/c/9625c46ce6fd4f922595a4b32b1de5066d70464f)
3. [](https://git.kernel.org/stable/c/69b6a67f7052905e928d75a0c5871de50e686986)
4. [](https://git.kernel.org/stable/c/8058c88ac0df21239daee54b5934d5c80ca9685f)
5. [](https://git.kernel.org/stable/c/791a615b7ad2258c560f91852be54b0480837c93) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-27077, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-27077 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-27077
- **State**: PUBLISHED
- **Published Date**: March 23, 2022 at 23:25 UTC
- **Last Updated**: August 03, 2024 at 05:18 UTC
- **Reserved Date**: March 14, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tenda M3 1.10 V1.0.0.12(4856) was discovered to contain a command injection vulnerability via the component /cgi-bin/uploadWeiXinPic.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/GD008/vuln/blob/main/tenda_M3_uploadWeiXinPic/M3_uploadWeiXinPic.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-9164, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-9164 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9164
- **State**: PUBLISHED
- **Published Date**: May 23, 2017 at 03:56 UTC
- **Last Updated**: September 16, 2024 at 23:06 UTC
- **Reserved Date**: May 22, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
libautotrace.a in AutoTrace 0.31.1 has a heap-based buffer over-read in the GET_COLOR function in color.c:16:11.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://blogs.gentoo.org/ago/2017/05/20/autotrace-multiple-vulnerabilities-the-autotrace-nightmare/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-10848, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-10848 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-10848
- **State**: PUBLISHED
- **Published Date**: August 01, 2019 at 15:26 UTC
- **Last Updated**: August 06, 2024 at 03:38 UTC
- **Reserved Date**: July 31, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
cPanel before 11.54.0.4 allows arbitrary file-overwrite operations in scripts/quotacheck (SEC-81).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://documentation.cpanel.net/display/CL/54+Change+Log) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-43237, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-43237 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-43237
- **State**: PUBLISHED
- **Published Date**: September 21, 2023 at 00:00 UTC
- **Last Updated**: September 24, 2024 at 15:17 UTC
- **Reserved Date**: September 18, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
D-Link DIR-816 A2 v1.10CNB05 was discovered to contain a stack overflow via parameter macCloneMac in setMAC.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.dlink.com/en/security-bulletin/)
2. [](https://github.com/peris-navince/founded-0-days/blob/main/Dlink/816/setMAC/1.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-45583, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-45583 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-45583
- **State**: PUBLISHED
- **Published Date**: May 06, 2025 at 08:32 UTC
- **Last Updated**: May 07, 2025 at 03:55 UTC
- **Reserved Date**: September 02, 2024 at 10:26 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Memory corruption while handling multiple IOCTL calls from userspace to operate DMA operations.
### CVSS Metrics
- **CVSS Base Score**: 6.6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L`
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Qualcomm, Inc. - Snapdragon**
Affected versions:
- FastConnect 7800 (Status: affected)
- Snapdragon 8 Gen 3 Mobile Platform (Status: affected)
- WCD9390 (Status: affected)
- WCD9395 (Status: affected)
- WSA8840 (Status: affected)
- WSA8845 (Status: affected)
- WSA8845H (Status: affected)
### References
1. [](https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2025-bulletin.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-2810, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-2810 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-2810
- **State**: PUBLISHED
- **Published Date**: August 20, 2010 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 02:46 UTC
- **Reserved Date**: July 22, 2010 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Heap-based buffer overflow in the convert_to_idna function in WWW/Library/Implementation/HTParse.c in Lynx 2.8.8dev.1 through 2.8.8dev.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed URL containing a % (percent) character in the domain name.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [lynx-converttoidna-bo(61007)](https://exchange.xforce.ibmcloud.com/vulnerabilities/61007)
2. [[oss-security] 20100809 Re: CVE request: Lynx](http://marc.info/?l=oss-security&m=128152412221677&w=2)
3. [ADV-2010-2042](http://www.vupen.com/english/advisories/2010/2042)
4. [USN-1642-1](http://www.ubuntu.com/usn/USN-1642-1)
5. [[oss-security] 20100809 CVE request: Lynx](http://marc.info/?l=oss-security&m=128151768510564&w=2)
6. [](https://bugs.launchpad.net/ubuntu/+source/lynx-cur/+bug/613254) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-19216, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-19216 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-19216
- **State**: PUBLISHED
- **Published Date**: November 12, 2018 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 11:30 UTC
- **Reserved Date**: November 12, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Netwide Assembler (NASM) before 2.13.02 has a use-after-free in detoken at asm/preproc.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.nasm.us/show_bug.cgi?id=3392424)
2. [](https://repo.or.cz/nasm.git/commitdiff/9b7ee09abfd426b99aa1ea81d19a3b2818eeabf9)
3. [openSUSE-SU-2020:0952](http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html)
4. [openSUSE-SU-2020:0954](http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-28821, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-28821 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-28821
- **State**: PUBLISHED
- **Published Date**: March 23, 2021 at 20:15 UTC
- **Last Updated**: September 16, 2024 at 22:36 UTC
- **Reserved Date**: March 18, 2021 at 00:00 UTC
- **Assigned By**: tibco
### Vulnerability Description
The Windows Installation component of TIBCO Software Inc.'s TIBCO Enterprise Message Service, TIBCO Enterprise Message Service - Community Edition, and TIBCO Enterprise Message Service - Developer Edition contains a vulnerability that theoretically allows a low privileged attacker with local access on some versions of the Windows operating system to insert malicious software. The affected component can be abused to execute the malicious software inserted by the attacker with the elevated privileges of the component. This vulnerability results from a lack of access restrictions on certain files and/or folders in the installation. Affected releases are TIBCO Software Inc.'s TIBCO Enterprise Message Service: versions 8.5.1 and below, TIBCO Enterprise Message Service - Community Edition: versions 8.5.1 and below, and TIBCO Enterprise Message Service - Developer Edition: versions 8.5.1 and below.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H`
### Affected Products
**TIBCO Software Inc. - TIBCO Enterprise Message Service**
Affected versions:
- unspecified (Status: affected)
**TIBCO Software Inc. - TIBCO Enterprise Message Service - Community Edition**
Affected versions:
- unspecified (Status: affected)
**TIBCO Software Inc. - TIBCO Enterprise Message Service - Developer Edition**
Affected versions:
- unspecified (Status: affected)
### References
1. [](http://www.tibco.com/services/support/advisories)
### Credits
- TIBCO would like to extend its appreciation to Will Dormann of CERT/CC for discovery of this vulnerability. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-5423, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-5423 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-5423
- **State**: PUBLISHED
- **Published Date**: October 05, 2023 at 17:00 UTC
- **Last Updated**: August 02, 2024 at 07:59 UTC
- **Reserved Date**: October 05, 2023 at 10:01 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability has been found in SourceCodester Online Pizza Ordering System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/ajax.php?action=confirm_order. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The identifier of this vulnerability is VDB-241384.
### CVSS Metrics
- **CVSS Base Score**: 4.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**SourceCodester - Online Pizza Ordering System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://vuldb.com/?id.241384)
2. [](https://vuldb.com/?ctiid.241384)
### Credits
- simon.davis8080 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-26006, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-26006 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-26006
- **State**: PUBLISHED
- **Published Date**: March 26, 2025 at 00:00 UTC
- **Last Updated**: March 27, 2025 at 13:50 UTC
- **Reserved Date**: February 07, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Telesquare TLR-2005KSH 1.1.4 has an unauthorized stack overflow vulnerability when requesting the admin.cgi parameter with setAutorest.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Fan-24/Digging/blob/main/4/1.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-0626, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-0626 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-0626
- **State**: PUBLISHED
- **Published Date**: September 29, 1999 at 04:00 UTC
- **Last Updated**: August 01, 2024 at 16:41 UTC
- **Reserved Date**: June 07, 1999 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A version of rusers is running that exposes valid user information to any entity on the network.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.cve.org/CVERecord?id=CVE-1999-0626) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-1501, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-1501 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-1501
- **State**: PUBLISHED
- **Published Date**: March 19, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 09:42 UTC
- **Reserved Date**: January 16, 2014 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
Mozilla Firefox before 28.0 on Android allows remote attackers to bypass the Same Origin Policy and access arbitrary file: URLs via vectors involving the "Open Link in New Tab" menu selection.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SUSE-SU-2014:0418](http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00016.html)
2. [](http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html)
3. [](http://www.mozilla.org/security/announce/2014/mfsa2014-21.html)
4. [](https://bugzilla.mozilla.org/show_bug.cgi?id=960135) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-14009, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-14009 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14009
- **State**: PUBLISHED
- **Published Date**: October 17, 2017 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 19:13 UTC
- **Reserved Date**: August 30, 2017 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
An Information Exposure issue was discovered in ProMinent MultiFLEX M10a Controller web interface. When an authenticated user uses the Change Password feature on the application, the current password for the user is specified in plaintext. This may allow an attacker who has been authenticated to gain access to the password.
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**n/a - ProMinent MultiFLEX M10a Controller**
Affected versions:
- ProMinent MultiFLEX M10a Controller (Status: affected)
### References
1. [101259](http://www.securityfocus.com/bid/101259)
2. [](https://ics-cert.us-cert.gov/advisories/ICSA-17-285-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-0543, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-0543 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-0543
- **State**: PUBLISHED
- **Published Date**: February 18, 2022 at 19:25 UTC
- **Last Updated**: January 29, 2025 at 20:49 UTC
- **Reserved Date**: February 08, 2022 at 00:00 UTC
- **Assigned By**: debian
### Vulnerability Description
It was discovered, that redis, a persistent key-value database, due to a packaging issue, is prone to a (Debian-specific) Lua sandbox escape, which could result in remote code execution.
### Affected Products
**Debian - redis**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugs.debian.org/1005787)
2. [](https://www.ubercomp.com/posts/2022-01-20_redis_on_debian_rce)
3. [[debian-security-announce] 20220218 [SECURITY] [DSA 5081-1] redis security update](https://lists.debian.org/debian-security-announce/2022/msg00048.html)
4. [DSA-5081](https://www.debian.org/security/2022/dsa-5081)
5. [](https://security.netapp.com/advisory/ntap-20220331-0004/)
6. [](http://packetstormsecurity.com/files/166885/Redis-Lua-Sandbox-Escape.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-4461, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-4461 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4461
- **State**: PUBLISHED
- **Published Date**: February 05, 2018 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 06:18 UTC
- **Reserved Date**: June 10, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Absolute path traversal vulnerability in eFront CMS 3.6.15.4 and earlier allows remote Professor users to obtain sensitive information via a full pathname in the other parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://forum.efrontlearning.net/viewtopic.php?f=15&t=9841)
2. [](https://mohankallepalli.blogspot.in/2015/05/eFront-cms-multiple-bugs.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-1399, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-1399 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-1399
- **State**: PUBLISHED
- **Published Date**: April 29, 2015 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 04:40 UTC
- **Reserved Date**: January 27, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in the fetchView function in the Mage_Core_Block_Template_Zend class in Magento Community Edition (CE) 1.9.1.0 and Enterprise Edition (EE) 1.14.1.0 allows remote administrators to execute arbitrary PHP code via a URL in unspecified vectors involving the setScriptPath function. NOTE: it is not clear whether this issue crosses privilege boundaries, since administrators might already have privileges to include arbitrary files.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://magento.com/blog/technical/critical-security-advisory-remote-code-execution-rce-vulnerability)
2. [1032194](http://www.securitytracker.com/id/1032194)
3. [](http://blog.checkpoint.com/2015/04/20/analyzing-magento-vulnerability/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-42246, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-42246 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-42246
- **State**: PUBLISHED
- **Published Date**: August 07, 2024 at 15:14 UTC
- **Last Updated**: May 04, 2025 at 09:24 UTC
- **Reserved Date**: July 30, 2024 at 07:40 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket
When using a BPF program on kernel_connect(), the call can return -EPERM. This
causes xs_tcp_setup_socket() to loop forever, filling up the syslog and causing
the kernel to potentially freeze up.
Neil suggested:
This will propagate -EPERM up into other layers which might not be ready
to handle it. It might be safer to map EPERM to an error we would be more
likely to expect from the network system - such as ECONNREFUSED or ENETDOWN.
ECONNREFUSED as error seems reasonable. For programs setting a different error
can be out of reach (see handling in 4fbac77d2d09) in particular on kernels
which do not have f10d05966196 ("bpf: Make BPF_PROG_RUN_ARRAY return -err
instead of allow boolean"), thus given that it is better to simply remap for
consistent behavior. UDP does handle EPERM in xs_udp_send_request().
### Affected Products
**Linux - Linux**
Affected versions:
- 4fbac77d2d092b475dda9eea66da674369665427 (Status: affected)
- 4fbac77d2d092b475dda9eea66da674369665427 (Status: affected)
- 4fbac77d2d092b475dda9eea66da674369665427 (Status: affected)
- 4fbac77d2d092b475dda9eea66da674369665427 (Status: affected)
- 4fbac77d2d092b475dda9eea66da674369665427 (Status: affected)
- 4fbac77d2d092b475dda9eea66da674369665427 (Status: affected)
- 4fbac77d2d092b475dda9eea66da674369665427 (Status: affected)
- 4fbac77d2d092b475dda9eea66da674369665427 (Status: affected)
**Linux - Linux**
Affected versions:
- 4.17 (Status: affected)
- 0 (Status: unaffected)
- 4.19.322 (Status: unaffected)
- 5.4.284 (Status: unaffected)
- 5.10.226 (Status: unaffected)
- 5.15.167 (Status: unaffected)
- 6.1.100 (Status: unaffected)
- 6.6.41 (Status: unaffected)
- 6.9.10 (Status: unaffected)
- 6.10 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/bc790261218952635f846aaf90bcc0974f6f62c6)
2. [](https://git.kernel.org/stable/c/934247ea65bc5eca8bdb7f8c0ddc15cef992a5d6)
3. [](https://git.kernel.org/stable/c/02ee1976edb21a96ce8e3fd4ef563f14cc16d041)
4. [](https://git.kernel.org/stable/c/5d8254e012996cee1a0f9cc920531cb7e4d9a011)
5. [](https://git.kernel.org/stable/c/f2431e7db0fe0daccb2f06bb0d23740affcd2fa6)
6. [](https://git.kernel.org/stable/c/d6c686c01c5f12ff8f7264e0ddf71df6cb0d4414)
7. [](https://git.kernel.org/stable/c/f388cfd913a2b96c05339a335f365795db1b36b6)
8. [](https://git.kernel.org/stable/c/626dfed5fa3bfb41e0dffd796032b555b69f9cde) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-23836, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-23836 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-23836
- **State**: PUBLISHED
- **Published Date**: February 15, 2023 at 00:00 UTC
- **Last Updated**: March 18, 2025 at 15:48 UTC
- **Reserved Date**: January 18, 2023 at 00:00 UTC
- **Assigned By**: SolarWinds
### Vulnerability Description
SolarWinds Platform version 2022.4.1 was found to be susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to the SolarWinds Web Console to execute arbitrary commands.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-502: Deserialization of Untrusted Data
### Affected Products
**SolarWinds - SolarWinds Platform**
Affected versions:
- 2022.4.1 and prior versions (Status: affected)
### References
1. [](https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2023-1_release_notes.htm)
2. [](https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-23836)
### Credits
- SolarWinds would like to thank Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative for reporting on the issue in a responsible manner. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-8580, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-8580 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8580
- **State**: PUBLISHED
- **Published Date**: September 08, 2024 at 20:31 UTC
- **Last Updated**: September 09, 2024 at 13:44 UTC
- **Reserved Date**: September 07, 2024 at 17:16 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical was found in TOTOLINK AC1200 T8 4.1.5cu.861_B20230220. This vulnerability affects unknown code of the file /etc/shadow.sample. The manipulation leads to use of hard-coded password. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-259: Security Weakness
### Affected Products
**TOTOLINK - AC1200 T8**
Affected versions:
- 4.1.5cu.861_B20230220 (Status: affected)
### References
1. [VDB-276814 | TOTOLINK AC1200 T8 shadow.sample hard-coded password](https://vuldb.com/?id.276814)
2. [VDB-276814 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.276814)
3. [Submit #401293 | TOTOLINK AC1200 T8 V4.1.5cu.861_B20230220 Use of Hard-coded Password](https://vuldb.com/?submit.401293)
4. [](https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/AC1200T8/shadow.md)
5. [](https://www.totolink.net/)
### Credits
- yhryhryhr_tu (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-3702, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-3702 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-3702
- **State**: PUBLISHED
- **Published Date**: November 05, 2010 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 03:18 UTC
- **Reserved Date**: October 01, 2010 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, CUPS, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) via unknown vectors that trigger an uninitialized pointer dereference.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [FEDORA-2010-16662](http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html)
2. [[oss-security] 20101004 Re: CVE requests: Poppler, Quassel, Pyfribidi, Overkill, DocUtils, FireGPG, Wireshark](http://www.openwall.com/lists/oss-security/2010/10/04/6)
3. [FEDORA-2010-15857](http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html)
4. [](http://cgit.freedesktop.org/poppler/poppler/commit/?id=e853106b58d6b4b0467dbd6436c9bb1cfbd372cf)
5. [RHSA-2010:0859](http://www.redhat.com/support/errata/RHSA-2010-0859.html)
6. [42357](http://secunia.com/advisories/42357)
7. [MDVSA-2010:228](http://www.mandriva.com/security/advisories?name=MDVSA-2010:228)
8. [ADV-2011-0230](http://www.vupen.com/english/advisories/2011/0230)
9. [RHSA-2010:0752](http://www.redhat.com/support/errata/RHSA-2010-0752.html)
10. [](http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html)
11. [SUSE-SR:2010:023](http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html)
12. [MDVSA-2010:230](http://www.mandriva.com/security/advisories?name=MDVSA-2010:230)
13. [SUSE-SR:2010:022](http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html)
14. [](ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch)
15. [RHSA-2012:1201](http://rhn.redhat.com/errata/RHSA-2012-1201.html)
16. [43845](http://www.securityfocus.com/bid/43845)
17. [MDVSA-2010:231](http://www.mandriva.com/security/advisories?name=MDVSA-2010:231)
18. [FEDORA-2010-16705](http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html)
19. [SSA:2010-324-01](http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720)
20. [RHSA-2010:0751](http://www.redhat.com/support/errata/RHSA-2010-0751.html)
21. [42397](http://secunia.com/advisories/42397)
22. [42141](http://secunia.com/advisories/42141)
23. [FEDORA-2010-15911](http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html)
24. [MDVSA-2012:144](http://www.mandriva.com/security/advisories?name=MDVSA-2012:144)
25. [ADV-2010-3097](http://www.vupen.com/english/advisories/2010/3097)
26. [USN-1005-1](http://www.ubuntu.com/usn/USN-1005-1)
27. [RHSA-2010:0749](http://www.redhat.com/support/errata/RHSA-2010-0749.html)
28. [RHSA-2010:0754](http://www.redhat.com/support/errata/RHSA-2010-0754.html)
29. [FEDORA-2010-15981](http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html)
30. [FEDORA-2010-16744](http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html)
31. [](https://bugzilla.redhat.com/show_bug.cgi?id=595245)
32. [ADV-2010-2897](http://www.vupen.com/english/advisories/2010/2897)
33. [42691](http://secunia.com/advisories/42691)
34. [DSA-2119](http://www.debian.org/security/2010/dsa-2119)
35. [SUSE-SR:2010:024](http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html)
36. [MDVSA-2010:229](http://www.mandriva.com/security/advisories?name=MDVSA-2010:229)
37. [DSA-2135](http://www.debian.org/security/2010/dsa-2135)
38. [RHSA-2010:0750](http://www.redhat.com/support/errata/RHSA-2010-0750.html)
39. [RHSA-2010:0755](http://www.redhat.com/support/errata/RHSA-2010-0755.html)
40. [RHSA-2010:0753](http://www.redhat.com/support/errata/RHSA-2010-0753.html)
41. [43079](http://secunia.com/advisories/43079) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-22724, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-22724 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-22724
- **State**: PUBLISHED
- **Published Date**: January 25, 2023 at 05:55 UTC
- **Last Updated**: March 10, 2025 at 21:20 UTC
- **Reserved Date**: January 06, 2023 at 14:21 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
GLPI is a Free Asset and IT Management Software package. Versions prior to 10.0.6 are subject to Cross-site Scripting via malicious RSS feeds. An Administrator can import a malicious RSS feed that contains Cross Site Scripting (XSS) payloads inside RSS links. Victims who wish to visit an RSS content and click on the link will execute the Javascript. This issue is patched in 10.0.6.
### CVSS Metrics
- **CVSS Base Score**: 6.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**glpi-project - glpi**
Affected versions:
- < 10.0.6 (Status: affected)
### References
1. [https://github.com/glpi-project/glpi/security/advisories/GHSA-x9g4-j85w-cmff](https://github.com/glpi-project/glpi/security/advisories/GHSA-x9g4-j85w-cmff) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-8669, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-8669 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-8669
- **State**: PUBLISHED
- **Published Date**: December 18, 2019 at 17:33 UTC
- **Last Updated**: August 04, 2024 at 21:24 UTC
- **Reserved Date**: February 18, 2019 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
### Affected Products
**Apple - iOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
**Apple - Safari**
Affected versions:
- unspecified (Status: affected)
**Apple - iTunes for Windows**
Affected versions:
- unspecified (Status: affected)
**Apple - iCloud for Windows**
Affected versions:
- unspecified (Status: affected)
**Apple - iCloud for Windows (Microsoft Store)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/HT210353)
2. [](https://support.apple.com/HT210346)
3. [](https://support.apple.com/HT210348)
4. [](https://support.apple.com/HT210351)
5. [](https://support.apple.com/HT210355)
6. [](https://support.apple.com/HT210356)
7. [](https://support.apple.com/HT210357)
8. [](https://support.apple.com/HT210358) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-0886, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-0886 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-0886
- **State**: PUBLISHED
- **Published Date**: January 22, 2001 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 05:37 UTC
- **Reserved Date**: November 02, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
IIS 5.0 allows remote attackers to execute arbitrary commands via a malformed request for an executable file whose name is appended with operating system commands, aka the "Web Server File Request Parsing" vulnerability.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oval:org.mitre.oval:def:191](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A191)
2. [MS00-086](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-086)
3. [20001107 NSFOCUS SA2000-07 : Microsoft IIS 4.0/5.0 CGI File Name Inspection Vulnerability](http://www.securityfocus.com/templates/archive.pike?mid=143604&list=1&fromthread=0&end=2000-11-11&threads=0&start=2000-11-05&)
4. [1912](http://www.securityfocus.com/bid/1912)
5. [iis-invalid-filename-passing(5470)](https://exchange.xforce.ibmcloud.com/vulnerabilities/5470) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-20719, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-20719 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-20719
- **State**: PUBLISHED
- **Published Date**: May 15, 2023 at 00:00 UTC
- **Last Updated**: January 24, 2025 at 15:08 UTC
- **Reserved Date**: October 28, 2022 at 00:00 UTC
- **Assigned By**: MediaTek
### Vulnerability Description
In pqframework, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07629583; Issue ID: ALPS07629583.
### Affected Products
**MediaTek, Inc. - MT6580, MT6739, MT6761, MT6765, MT6768, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6889, MT6893, MT6895, MT6983, MT6985, MT8167, MT8168, MT8195, MT8673**
Affected versions:
- Android 12.0, 13.0 (Status: affected)
### References
1. [](https://corp.mediatek.com/product-security-bulletin/May-2023) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-34802, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-34802 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-34802
- **State**: PUBLISHED
- **Published Date**: July 27, 2021 at 11:25 UTC
- **Last Updated**: August 04, 2024 at 00:26 UTC
- **Reserved Date**: June 16, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A failure in resetting the security context in some transaction actions in Neo4j Graph Database 4.2 and 4.3 could allow authenticated users to execute commands with elevated privileges.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://neo4j.com)
2. [](https://neo4j.com/developer/kb/neo4j-4-2-x-sec-vuln-fix/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-47515, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-47515 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-47515
- **State**: PUBLISHED
- **Published Date**: May 07, 2025 at 14:20 UTC
- **Last Updated**: May 07, 2025 at 18:20 UTC
- **Reserved Date**: May 07, 2025 at 09:39 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Seb WP DPE-GES allows DOM-Based XSS. This issue affects WP DPE-GES: from n/a through 1.6.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Seb - WP DPE-GES**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/wp-dpe-ges/vulnerability/wordpress-wp-dpe-ges-1-6-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- johska (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-44559, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-44559 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-44559
- **State**: PUBLISHED
- **Published Date**: November 09, 2022 at 00:00 UTC
- **Last Updated**: May 01, 2025 at 13:52 UTC
- **Reserved Date**: November 01, 2022 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
The AMS module has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation.
### Affected Products
**Huawei - HarmonyOS**
Affected versions:
- 2.0 (Status: affected)
- 2.1 (Status: affected)
**Huawei - EMUI**
Affected versions:
- 12.0.1 (Status: affected)
- 12.0.0 (Status: affected)
- 11.0.1 (Status: affected)
### References
1. [](https://consumer.huawei.com/en/support/bulletin/2022/11/)
2. [](https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-1332, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-1332 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-1332
- **State**: PUBLISHED
- **Published Date**: May 04, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 21:44 UTC
- **Reserved Date**: April 27, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Bluetooth-enabled systems in Mac OS X 10.3.9 enables the Bluetooth file exchange service by default, which allows remote attackers to access files without the user being notified, and local users to access files via the default directory.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [TA05-136A](http://www.us-cert.gov/cas/techalerts/TA05-136A.html)
2. [VU#258390](http://www.kb.cert.org/vuls/id/258390)
3. [APPLE-SA-2005-05-03](http://lists.apple.com/archives/security-announce/2005/May/msg00001.html)
4. [](http://docs.info.apple.com/article.html?artnum=301381)
5. [](http://www.digitalmunition.com/DMA%5B2005-0502a%5D.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-39069, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-39069 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-39069
- **State**: PUBLISHED
- **Published Date**: November 08, 2022 at 00:00 UTC
- **Last Updated**: May 01, 2025 at 14:08 UTC
- **Reserved Date**: August 31, 2022 at 00:00 UTC
- **Assigned By**: zte
### Vulnerability Description
There is a SQL injection vulnerability in ZTE ZAIP-AIE. Due to lack of input verification by the server, an attacker could trigger an attack by building malicious requests. Exploitation of this vulnerability could cause the leakage of the current table content.
### Affected Products
**n/a - ZAIP-AIE**
Affected versions:
- ZAIP-AIEV8.22.01 (Status: affected)
### References
1. [](https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1026604) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-23755, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-23755 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-23755
- **State**: PUBLISHED
- **Published Date**: March 23, 2024 at 00:00 UTC
- **Last Updated**: August 16, 2024 at 16:54 UTC
- **Reserved Date**: January 22, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ClickUp Desktop before 3.3.77 on macOS and Windows allows code injection because of specific Electron Fuses. There is inadequate protection against code injection through settings such as RunAsNode.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.electronjs.org/docs/latest/tutorial/fuses)
2. [](https://clickup.com/terms/security-policy)
3. [](https://www.electronjs.org/blog/statement-run-as-node-cves)
4. [](https://clickup.com/security/disclosures) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-3460, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-3460 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3460
- **State**: PUBLISHED
- **Published Date**: February 02, 2012 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 23:37 UTC
- **Reserved Date**: September 13, 2011 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Buffer overflow in QuickTime in Apple Mac OS X before 10.7.3 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PNG file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.apple.com/kb/HT5130)
2. [](http://support.apple.com/kb/HT5261)
3. [APPLE-SA-2012-02-01-1](http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html)
4. [APPLE-SA-2012-05-15-1](http://lists.apple.com/archives/security-announce/2012/May/msg00005.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-5811, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-5811 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-5811
- **State**: PUBLISHED
- **Published Date**: September 09, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 11:55 UTC
- **Reserved Date**: August 30, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The ZOOM Cloud Meetings (aka us.zoom.videomeetings) application @7F060008 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#297641](http://www.kb.cert.org/vuls/id/297641)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-8393, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-8393 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-8393
- **State**: PUBLISHED
- **Published Date**: February 17, 2019 at 15:00 UTC
- **Last Updated**: August 04, 2024 at 21:17 UTC
- **Reserved Date**: February 16, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Hotels_Server through 2018-11-05 has SQL Injection via the API because the controller/api/login.php telephone parameter is mishandled.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/FantasticLBP/Hotels_Server/issues/4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-43766, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-43766 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-43766
- **State**: PUBLISHED
- **Published Date**: October 26, 2022 at 00:00 UTC
- **Last Updated**: May 07, 2025 at 13:39 UTC
- **Reserved Date**: October 26, 2022 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
Apache IoTDB version 0.12.2 to 0.12.6, 0.13.0 to 0.13.2 are vulnerable to a Denial of Service attack when accepting untrusted patterns for REGEXP queries with Java 8. Users should upgrade to 0.13.3 which addresses this issue or use a later version of Java to avoid it.
### Affected Products
**Apache Software Foundation - Apache IoTDB**
Affected versions:
- unspecified (Status: affected)
- 0.12.2 (Status: affected)
### References
1. [](https://lists.apache.org/thread/9pgpb82p5brooy41n8l5q0y9h33db2zn)
### Credits
- This issue was discovered by 4ra1n of Chaitin Tech |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-0971, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-0971 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-0971
- **State**: PUBLISHED
- **Published Date**: May 14, 2015 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 04:26 UTC
- **Reserved Date**: January 10, 2015 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The DER parser in Suricata before 2.0.8 allows remote attackers to cause a denial of service (crash) via vectors related to SSL/TLS certificates.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://suricata-ids.org/2015/05/06/suricata-2-0-8-available/)
2. [DSA-3254](http://www.debian.org/security/2015/dsa-3254) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-4853, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-4853 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-4853
- **State**: REJECTED
- **Last Updated**: May 12, 2023 at 00:00 UTC
- **Reserved Date**: December 29, 2022 at 00:00 UTC
- **Assigned By**: lenovo
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1003065, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1003065 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1003065
- **State**: PUBLISHED
- **Published Date**: April 04, 2019 at 15:38 UTC
- **Last Updated**: August 05, 2024 at 03:07 UTC
- **Reserved Date**: April 03, 2019 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
Jenkins CloudShare Docker-Machine Plugin stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
### Affected Products
**Jenkins project - Jenkins CloudShare Docker-Machine Plugin**
Affected versions:
- all versions as of 2019-04-03 (Status: affected)
### References
1. [107790](http://www.securityfocus.com/bid/107790)
2. [[oss-security] 20190413 Re: Multiple vulnerabilities in Jenkins plugins](http://www.openwall.com/lists/oss-security/2019/04/12/2)
3. [](https://jenkins.io/security/advisory/2019-04-03/#SECURITY-838) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-35241, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-35241 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-35241
- **State**: PUBLISHED
- **Published Date**: December 30, 2020 at 14:26 UTC
- **Last Updated**: January 29, 2025 at 20:58 UTC
- **Reserved Date**: December 14, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
FlatPress 1.0.3 is affected by cross-site scripting (XSS) in the Blog Content component. This vulnerability can allow an attacker to inject the XSS payload in Blog content via the admin panel. Each time any user will go to that blog page, the XSS triggers and the attacker can steal the cookie according to the crafted payload.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.flatpress.org/download)
2. [](https://github.com/hemantsolo/CVE-Reference/blob/main/CVE-2020-35241.md)
3. [](https://github.com/alpernae/vulnerability-research/tree/main/CVE-2020-35241)
4. [](https://www.exploit-db.com/exploits/48826) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-10936, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-10936 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-10936
- **State**: PUBLISHED
- **Published Date**: January 21, 2025 at 08:21 UTC
- **Last Updated**: January 21, 2025 at 16:38 UTC
- **Reserved Date**: November 06, 2024 at 19:00 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The String locator plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.6.6 via deserialization of untrusted input in the 'recursive_unserialize_replace' function. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. An administrator must perform a search and replace action to trigger the exploit.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-502: Deserialization of Untrusted Data
### Affected Products
**instawp - String locator**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/1404f034-2d1d-44b2-87e5-61f72f215417?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/string-locator/trunk/includes/Extension/SearchReplace/Replace/class-sql.php#L170)
3. [](https://plugins.trac.wordpress.org/changeset/3222952/)
### Credits
- Craig Smith |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-27526, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-27526 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-27526
- **State**: PUBLISHED
- **Published Date**: September 06, 2023 at 12:44 UTC
- **Last Updated**: September 26, 2024 at 15:29 UTC
- **Reserved Date**: March 02, 2023 at 14:15 UTC
- **Assigned By**: apache
### Vulnerability Description
A non Admin authenticated user could incorrectly create resources using the import charts feature, on Apache Superset up to and including 2.1.0.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-863: Incorrect Authorization
### Affected Products
**Apache Software Foundation - Apache Superset**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://lists.apache.org/thread/ndww89yl2jd98lvn23n9cj722lfdg8dv)
### Credits
- NTT DATA |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-1050, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-1050 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-1050
- **State**: PUBLISHED
- **Published Date**: November 18, 2004 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 00:38 UTC
- **Reserved Date**: November 17, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Heap-based buffer overflow in Internet Explorer 6 allows remote attackers to execute arbitrary code via long (1) SRC or (2) NAME attributes in IFRAME, FRAME, and EMBED elements, as originally discovered using the mangleme utility, aka "the IFRAME vulnerability" or the "HTML Elements Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#842160](http://www.kb.cert.org/vuls/id/842160)
2. [20041023 python does mangleme (with IE bugs!)](http://lists.grok.org.uk/pipermail/full-disclosure/2004-October/028009.html)
3. [MS04-040](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-040)
4. [20041102 MSIE <IFRAME> and <FRAME> tag NAME property bufferoverflow PoC](http://marc.info/?l=bugtraq&m=109942758911846&w=2)
5. [11515](http://www.securityfocus.com/bid/11515)
6. [oval:org.mitre.oval:def:1294](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1294)
7. [20041025 python does mangleme (with IE bugs!)](http://lists.grok.org.uk/pipermail/full-disclosure/2004-October/028035.html)
8. [TA04-315A](http://www.us-cert.gov/cas/techalerts/TA04-315A.html)
9. [ie-iframe-src-name-bo(17889)](https://exchange.xforce.ibmcloud.com/vulnerabilities/17889)
10. [12959](http://secunia.com/advisories/12959/)
11. [20041024 python does mangleme (with IE bugs!)](http://www.securityfocus.com/archive/1/379261)
12. [TA04-336A](http://www.us-cert.gov/cas/techalerts/TA04-336A.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-26557, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-26557 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-26557
- **State**: PUBLISHED
- **Published Date**: March 22, 2024 at 00:00 UTC
- **Last Updated**: March 27, 2025 at 14:16 UTC
- **Reserved Date**: February 19, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Codiad v2.8.4 allows reflected XSS via the components/market/dialog.php type parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Hebing123/cve/issues/18) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-4130, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-4130 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-4130
- **State**: PUBLISHED
- **Published Date**: December 09, 2005 at 11:00 UTC
- **Last Updated**: September 16, 2024 at 20:59 UTC
- **Reserved Date**: December 09, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
** UNVERIFIABLE, PRERELEASE ** NOTE: this issue describes a problem that can not be independently verified as of 20051208. Unspecified vulnerability in unspecified versions of Real Networks RealPlayer allows remote attackers to execute arbitrary code. NOTE: it is not known whether this issue should be MERGED with CVE-2005-4126. The information regarding this issue is extremely vague and does not provide any verifiable information. It has been posted by a reliable reporter with a prerelease disclosure policy. This item has only been assigned a CVE identifier for tracking purposes, and to serve as a concrete example for discussion of the newly emerging UNVERIFIABLE and PRERELEASE content decisions in CVE, which must be discussed by the Editorial Board. Without additional details or independent verification by reliable sources, it is possible that this item might be RECAST or REJECTED.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.eeye.com/html/research/upcoming/20051116.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-19747, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-19747 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-19747
- **State**: PUBLISHED
- **Published Date**: December 20, 2019 at 16:41 UTC
- **Last Updated**: August 05, 2024 at 02:25 UTC
- **Reserved Date**: December 12, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
NeuVector 3.1 when configured to allow authentication via Active Directory, does not enforce non-empty passwords which allows an attacker with access to the Neuvector portal to authenticate as any valid LDAP user by providing a valid username and an empty password (provided that the active directory server has not been configured to reject empty passwords).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://neuvector.com/container-security/blog/)
2. [](https://paulrobertson.co.za/cve-2019-19747/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-9206, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-9206 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-9206
- **State**: PUBLISHED
- **Published Date**: December 14, 2016 at 00:37 UTC
- **Last Updated**: August 06, 2024 at 02:42 UTC
- **Reserved Date**: November 06, 2016 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the ccmadmin page of Cisco Unified Communications Manager (CUCM) could allow an unauthenticated, remote attacker to conduct reflected cross-site scripting (XSS) attacks. More Information: CSCvb64641. Known Affected Releases: 11.5(1.10000.6) 11.5(1.11007.2). Known Fixed Releases: 11.5(1.12900.7) 11.5(1.12900.8) 12.0(0.98000.155) 12.0(0.98000.178) 12.0(0.98000.366) 12.0(0.98000.468) 12.0(0.98000.536) 12.0(0.98500.6).
### Affected Products
**n/a - Cisco Unified Communications Manager (CUCM)**
Affected versions:
- Cisco Unified Communications Manager (CUCM) (Status: affected)
### References
1. [94793](http://www.securityfocus.com/bid/94793)
2. [1037424](http://www.securitytracker.com/id/1037424)
3. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-cucm) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-13619, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-13619 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13619
- **State**: PUBLISHED
- **Published Date**: May 15, 2025 at 20:07 UTC
- **Last Updated**: May 20, 2025 at 19:26 UTC
- **Reserved Date**: January 22, 2025 at 15:38 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The LifterLMS WordPress plugin before 8.0.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - LifterLMS**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/97a7e1a6-0fb3-49e9-86fc-ebb1d426fcca/)
### Credits
- Hassan Khan Yusufzai - Splint3r7
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-8244, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-8244 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-8244
- **State**: PUBLISHED
- **Published Date**: August 30, 2020 at 13:43 UTC
- **Last Updated**: August 04, 2024 at 09:56 UTC
- **Reserved Date**: January 28, 2020 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
A buffer over-read vulnerability exists in bl <4.0.3, <3.0.1, <2.2.1, and <1.2.3 which could allow an attacker to supply user input (even typed) that if it ends up in consume() argument and can become negative, the BufferList state can be corrupted, tricking it into exposing uninitialized memory via regular .slice() calls.
### Weakness Classification (CWE)
- CWE-126: Security Weakness
### Affected Products
**n/a - bl**
Affected versions:
- Fixed in 4.0.3, 3.0.1, 2.2.1, and 1.2.3 (Status: affected)
### References
1. [](https://hackerone.com/reports/966347)
2. [[debian-lts-announce] 20210630 [SECURITY] [DLA 2698-1] node-bl security update](https://lists.debian.org/debian-lts-announce/2021/06/msg00028.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-30512, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-30512 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-30512
- **State**: PUBLISHED
- **Published Date**: June 04, 2021 at 17:15 UTC
- **Last Updated**: August 03, 2024 at 22:32 UTC
- **Reserved Date**: April 13, 2021 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use after free in Notifications in Google Chrome prior to 90.0.4430.212 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2021/05/stable-channel-update-for-desktop.html)
2. [](https://crbug.com/1200019)
3. [GLSA-202107-06](https://security.gentoo.org/glsa/202107-06)
4. [FEDORA-2021-f94dadff78](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAT6EOXVQFE6JFMFQF4IKAOUQSHMHL54/)
5. [FEDORA-2021-ca58c57bdf](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ETMZL6IHCTCTREEL434BQ4THQ7EOHJ43/) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.