System
stringclasses 1
value | User
stringlengths 139
142
| Assistant
stringlengths 279
328k
|
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-7476, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-7476 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-7476
- **State**: PUBLISHED
- **Published Date**: May 02, 2017 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 16:04 UTC
- **Reserved Date**: April 05, 2017 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Gnulib before 2017-04-26 has a heap-based buffer overflow with the TZ environment variable. The error is in the save_abbr function in time_rz.c.
### Affected Products
**n/a - Gnulib before 2017-04-26**
Affected versions:
- Gnulib before 2017-04-26 (Status: affected)
### References
1. [](https://security-tracker.debian.org/tracker/CVE-2017-7476)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=1445185)
3. [](https://bugzilla.redhat.com/show_bug.cgi?id=1444774)
4. [](http://git.savannah.gnu.org/gitweb/?p=gnulib.git%3Ba=commit%3Bh=94e01571507835ff59dd8ce2a0b56a4b566965a4)
5. [98098](http://www.securityfocus.com/bid/98098)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2009-3428, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2009-3428 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-3428
- **State**: PUBLISHED
- **Published Date**: September 25, 2009 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 06:31 UTC
- **Reserved Date**: September 25, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in Easy Music Player 1.0.0.2 allows remote attackers to execute arbitrary code via a crafted .wav file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [36267](http://secunia.com/advisories/36267)
2. [9420](http://www.exploit-db.com/exploits/9420)
3. [9418](http://www.exploit-db.com/exploits/9418)
4. [9412](http://www.exploit-db.com/exploits/9412)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-2516, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-2516 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-2516
- **State**: PUBLISHED
- **Published Date**: January 30, 2017 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 23:32 UTC
- **Reserved Date**: February 20, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
NTP before 4.2.8p7 and 4.3.x before 4.3.92, when mode7 is enabled, allows remote attackers to cause a denial of service (ntpd abort) by using the same IP address multiple times in an unconfig directive.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-3629](http://www.debian.org/security/2016/dsa-3629)
2. [88180](http://www.securityfocus.com/bid/88180)
3. [VU#718152](https://www.kb.cert.org/vuls/id/718152)
4. [1035705](http://www.securitytracker.com/id/1035705)
5. [](http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html)
6. [](https://security.netapp.com/advisory/ntap-20171004-0002/)
7. [](http://support.ntp.org/bin/view/Main/NtpBug3011)
8. [FreeBSD-SA-16:16](https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc)
9. [GLSA-201607-15](https://security.gentoo.org/glsa/201607-15)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2012-1807, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2012-1807 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-1807
- **State**: PUBLISHED
- **Published Date**: April 13, 2012 at 17:00 UTC
- **Last Updated**: September 16, 2024 at 22:55 UTC
- **Reserved Date**: March 21, 2012 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the web server in the ECOM Ethernet module in Koyo H0-ECOM, H0-ECOM100, H2-ECOM, H2-ECOM-F, H2-ECOM100, H4-ECOM, H4-ECOM-F, and H4-ECOM100 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.us-cert.gov/control_systems/pdf/ICSA-12-102-02.pdf)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-5925, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-5925 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-5925
- **State**: PUBLISHED
- **Published Date**: June 10, 2025 at 03:41 UTC
- **Last Updated**: June 10, 2025 at 13:10 UTC
- **Reserved Date**: June 09, 2025 at 14:28 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Bunny’s Print CSS plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.95. This is due to missing or incorrect nonce validation on the pcss_options_subpanel() function. This makes it possible for unauthenticated attackers to update settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**steph - Bunny’s Print CSS**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/53282bec-cd47-4db4-8ffe-6647521c0d49?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/bunnys-print-css/trunk/print-css.php#L49)
### Credits
- Nabil Irawan
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-33259, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-33259 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-33259
- **State**: PUBLISHED
- **Published Date**: April 26, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 02:27 UTC
- **Reserved Date**: April 23, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Jerryscript commit cefd391 was discovered to contain a segmentation violation via the component scanner_seek at jerry-core/parser/js/js-scanner-util.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/jerryscript-project/jerryscript/issues/5132)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2013-4967, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2013-4967 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4967
- **State**: PUBLISHED
- **Published Date**: August 20, 2013 at 22:00 UTC
- **Last Updated**: September 17, 2024 at 00:11 UTC
- **Reserved Date**: July 29, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Puppet Enterprise before 3.0.1 allows remote attackers to obtain the database password via vectors related to how the password is "seeded as a console parameter," External Node Classifiers, and the lack of access control for /nodes.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://puppetlabs.com/security/cve/cve-2013-4967)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-52829, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-52829 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-52829
- **State**: PUBLISHED
- **Published Date**: May 21, 2024 at 15:31 UTC
- **Last Updated**: May 04, 2025 at 07:43 UTC
- **Reserved Date**: May 21, 2024 at 15:19 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath12k: fix possible out-of-bound write in ath12k_wmi_ext_hal_reg_caps()
reg_cap.phy_id is extracted from WMI event and could be an unexpected value
in case some errors happen. As a result out-of-bound write may occur to
soc->hal_reg_cap. Fix it by validating reg_cap.phy_id before using it.
This is found during code review.
Compile tested only.
### Affected Products
**Linux - Linux**
Affected versions:
- d889913205cf7ebda905b1e62c5867ed4e39f6c2 (Status: affected)
- d889913205cf7ebda905b1e62c5867ed4e39f6c2 (Status: affected)
- d889913205cf7ebda905b1e62c5867ed4e39f6c2 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.3 (Status: affected)
- 0 (Status: unaffected)
- 6.5.13 (Status: unaffected)
- 6.6.3 (Status: unaffected)
- 6.7 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/dfe13eaab043130f90dd3d57c7d88577c04adc97)
2. [](https://git.kernel.org/stable/c/4dd0547e8b45faf6f95373be5436b66cde326c0e)
3. [](https://git.kernel.org/stable/c/b302dce3d9edea5b93d1902a541684a967f3c63c)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-0845, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-0845 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0845
- **State**: PUBLISHED
- **Published Date**: June 18, 2024 at 02:37 UTC
- **Last Updated**: August 01, 2024 at 18:18 UTC
- **Reserved Date**: January 23, 2024 at 21:51 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The PDF Viewer for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the render function in all versions up to, and including, 2.9.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Affected Products
**redlettuce - PDF Viewer for Elementor**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/4d6f9c80-ef86-4910-a88e-98f2b444ee30?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/pdf-viewer-for-elementor/trunk/widgets/pdfjs-viewer.php#L215)
3. [](https://plugins.trac.wordpress.org/browser/pdf-viewer-for-elementor/trunk/widgets/pdfjs-viewer.php#L219)
4. [](https://plugins.trac.wordpress.org/browser/pdf-viewer-for-elementor/trunk/widgets/pdf-viewer.php#L256)
5. [](https://plugins.trac.wordpress.org/browser/pdf-viewer-for-elementor/trunk/widgets/pdf-viewer.php#L260)
### Credits
- Craig Smith
- wesley
- Matthew Rollings
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-51865, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-51865 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-51865
- **State**: PUBLISHED
- **Published Date**: November 19, 2024 at 16:31 UTC
- **Last Updated**: November 20, 2024 at 14:36 UTC
- **Reserved Date**: November 04, 2024 at 09:58 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in N.O.U.S. Open Useful and Simple Simple Social Share Block allows Stored XSS.This issue affects Simple Social Share Block: from n/a through 1.0.0.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**N.O.U.S. Open Useful and Simple - Simple Social Share Block**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/simple-social-share-block/wordpress-simple-social-share-block-plugin-1-0-0-stored-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- SOPROBRO (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-18526, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-18526 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-18526
- **State**: PUBLISHED
- **Published Date**: August 20, 2019 at 15:26 UTC
- **Last Updated**: August 05, 2024 at 21:28 UTC
- **Reserved Date**: August 16, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The moreads-se plugin before 1.4.7 for WordPress has XSS.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wordpress.org/plugins/moreads-se/#developers)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-1093, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-1093 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-1093
- **State**: PUBLISHED
- **Published Date**: May 21, 2020 at 22:53 UTC
- **Last Updated**: August 04, 2024 at 06:25 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'VBScript Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1035, CVE-2020-1058, CVE-2020-1060.
### Affected Products
**Microsoft - Internet Explorer 9**
Affected versions:
- Windows Server 2008 for 32-bit Systems Service Pack 2 (Status: affected)
- Windows Server 2008 for x64-based Systems Service Pack 2 (Status: affected)
**Microsoft - Internet Explorer 11**
Affected versions:
- Windows 10 Version 1803 for 32-bit Systems (Status: affected)
- Windows 10 Version 1803 for x64-based Systems (Status: affected)
- Windows 10 Version 1803 for ARM64-based Systems (Status: affected)
- Windows 10 Version 1809 for 32-bit Systems (Status: affected)
- Windows 10 Version 1809 for x64-based Systems (Status: affected)
- Windows 10 Version 1809 for ARM64-based Systems (Status: affected)
- Windows Server 2019 (Status: affected)
- Windows 10 Version 1709 for 32-bit Systems (Status: affected)
- Windows 10 Version 1709 for x64-based Systems (Status: affected)
- Windows 10 Version 1709 for ARM64-based Systems (Status: affected)
- Windows 10 for 32-bit Systems (Status: affected)
- Windows 10 for x64-based Systems (Status: affected)
- Windows 10 Version 1607 for 32-bit Systems (Status: affected)
- Windows 10 Version 1607 for x64-based Systems (Status: affected)
- Windows Server 2016 (Status: affected)
- Windows 7 for 32-bit Systems Service Pack 1 (Status: affected)
- Windows 7 for x64-based Systems Service Pack 1 (Status: affected)
- Windows 8.1 for 32-bit systems (Status: affected)
- Windows 8.1 for x64-based systems (Status: affected)
- Windows RT 8.1 (Status: affected)
- Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Status: affected)
- Windows Server 2012 R2 (Status: affected)
**Microsoft - Internet Explorer 11 on Windows 10 Version 1909 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Internet Explorer 11 on Windows 10 Version 1909 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Internet Explorer 11 on Windows 10 Version 1909 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Internet Explorer 11 on Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Internet Explorer 11 on Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Internet Explorer 11 on Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Internet Explorer 11 on Windows Server 2012**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1093)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-31856, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-31856 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-31856
- **State**: PUBLISHED
- **Published Date**: July 05, 2022 at 19:27 UTC
- **Last Updated**: August 03, 2024 at 07:26 UTC
- **Reserved Date**: May 31, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Newsletter Module v3.x was discovered to contain a SQL injection vulnerability via the zemez_newsletter_email parameter at /index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.exploit-db.com/exploits/50942)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-7993, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-7993 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-7993
- **State**: PUBLISHED
- **Published Date**: August 26, 2019 at 18:48 UTC
- **Last Updated**: August 04, 2024 at 21:02 UTC
- **Reserved Date**: February 12, 2019 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Photoshop CC versions 19.1.8 and earlier and 20.0.5 and earlier have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution.
### Affected Products
**Adobe - Adobe Photoshop CC**
Affected versions:
- <=19.1.8 and <=20.0.5 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/photoshop/apsb19-44.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-34066, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-34066 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-34066
- **State**: PUBLISHED
- **Published Date**: May 03, 2024 at 17:42 UTC
- **Last Updated**: August 02, 2024 at 02:42 UTC
- **Reserved Date**: April 30, 2024 at 06:56 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Pterodactyl wings is the server control plane for Pterodactyl Panel. If the Wings token is leaked either by viewing the node configuration or posting it accidentally somewhere, an attacker can use it to gain arbitrary file write and read access on the node the token is associated to. This issue has been addressed in version 1.11.12 and users are advised to upgrade. Users unable to upgrade may enable the `ignore_panel_config_updates` option as a workaround.
### CVSS Metrics
- **CVSS Base Score**: 8.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-552: Security Weakness
### Affected Products
**pterodactyl - wings**
Affected versions:
- < 1.11.12 (Status: affected)
### References
1. [https://github.com/pterodactyl/wings/security/advisories/GHSA-gqmf-jqgv-v8fw](https://github.com/pterodactyl/wings/security/advisories/GHSA-gqmf-jqgv-v8fw)
2. [https://github.com/pterodactyl/wings/commit/5415f8ae07f533623bd8169836dd7e0b933964de](https://github.com/pterodactyl/wings/commit/5415f8ae07f533623bd8169836dd7e0b933964de)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2009-4617, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2009-4617 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4617
- **State**: PUBLISHED
- **Published Date**: January 18, 2010 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 07:08 UTC
- **Reserved Date**: January 18, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in Tourism Script Accommodation Hotel Booking Portal Script allow remote attackers to execute arbitrary SQL commands via the hotel_id parameter to (1) hotel.php, (2) details.php, (3) roomtypes.php, (4) photos.php, (5) map.php, (6) weather.php, (7) reviews.php, and (8) book.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [accommodation-hotelid-sql-injection(53138)](https://exchange.xforce.ibmcloud.com/vulnerabilities/53138)
2. [36661](http://secunia.com/advisories/36661)
3. [9632](http://www.exploit-db.com/exploits/9632)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-5729, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-5729 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-5729
- **State**: PUBLISHED
- **Published Date**: June 30, 2016 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 01:07 UTC
- **Reserved Date**: June 21, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Lenovo BIOS EFI Driver allows local administrators to execute arbitrary code with System Management Mode (SMM) privileges via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.lenovo.com/us/en/product_security/len_4901)
2. [91536](http://www.securityfocus.com/bid/91536)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2002-0244, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2002-0244 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-0244
- **State**: PUBLISHED
- **Published Date**: May 03, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 02:42 UTC
- **Reserved Date**: May 01, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in chroot function in AtheOS 0.3.7 allows attackers to escape the jail via a .. (dot dot) in the pathname argument to chdir.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [atheos-dot-directory-traversal(8108)](https://exchange.xforce.ibmcloud.com/vulnerabilities/8108)
2. [4051](http://www.securityfocus.com/bid/4051)
3. [20020207 AtheOS: escaping from a chroot jail](http://marc.info/?l=bugtraq&m=101310622531303&w=2)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2008-1777, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2008-1777 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1777
- **State**: PUBLISHED
- **Published Date**: April 14, 2008 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 08:32 UTC
- **Reserved Date**: April 14, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The eDirectory Host Environment service (dhost.exe) in Novell eDirectory 8.8.2 allows remote attackers to cause a denial of service (CPU consumption) via a long HTTP HEAD request to TCP port 8028.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [28572](http://www.securityfocus.com/bid/28572)
2. [ADV-2008-1075](http://www.vupen.com/english/advisories/2008/1075)
3. [](http://www.offensive-security.com/0day/novel-edir.py.txt)
4. [1019783](http://www.securitytracker.com/id?1019783)
5. [29639](http://secunia.com/advisories/29639)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-0649, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-0649 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-0649
- **State**: PUBLISHED
- **Published Date**: June 14, 2017 at 13:00 UTC
- **Last Updated**: August 05, 2024 at 13:11 UTC
- **Reserved Date**: November 29, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
An elevation of privilege vulnerability in the MediaTek sound driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and because of vulnerability specific details which limit the impact of the issue. Product: Android. Versions: N/A. Android ID: A-34468195. References: M-ALPS03162283.
### Affected Products
**Google Inc. - Android**
Affected versions:
- Android-N/A (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2017-06-01)
2. [98866](http://www.securityfocus.com/bid/98866)
3. [1038623](http://www.securitytracker.com/id/1038623)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-43530, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-43530 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-43530
- **State**: PUBLISHED
- **Published Date**: December 08, 2021 at 21:21 UTC
- **Last Updated**: August 04, 2024 at 03:55 UTC
- **Reserved Date**: November 08, 2021 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
A Universal XSS vulnerability was present in Firefox for Android resulting from improper sanitization when processing a URL scanned from a QR code. *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 94.
### Affected Products
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.mozilla.org/security/advisories/mfsa2021-48/)
2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1736886)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-3636, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-3636 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-3636
- **State**: PUBLISHED
- **Published Date**: July 30, 2021 at 19:27 UTC
- **Last Updated**: August 03, 2024 at 17:01 UTC
- **Reserved Date**: July 02, 2021 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
It was found in OpenShift, before version 4.8, that the generated certificate for the in-cluster Service CA, incorrectly included additional certificates. The Service CA is automatically mounted into all pods, allowing them to safely connect to trusted in-cluster services that present certificates signed by the trusted Service CA. The incorrect inclusion of additional CAs in this certificate would allow an attacker that compromises any of the additional CAs to masquerade as a trusted in-cluster service.
### Weakness Classification (CWE)
- CWE-295: Security Weakness
### Affected Products
**n/a - openshift**
Affected versions:
- openshift 4.8 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1978621)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-7714, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-7714 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-7714
- **State**: PUBLISHED
- **Published Date**: February 20, 2017 at 08:35 UTC
- **Last Updated**: August 06, 2024 at 02:04 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "IOKit" component. It allows local users to obtain sensitive kernel memory-layout information via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.apple.com/HT207487)
2. [](https://support.apple.com/HT207422)
3. [](https://support.apple.com/HT207423)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-6756, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-6756 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-6756
- **State**: PUBLISHED
- **Published Date**: January 09, 2020 at 22:10 UTC
- **Last Updated**: August 04, 2024 at 09:11 UTC
- **Reserved Date**: January 09, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
languageOptions.php in Rasilient PixelStor 5000 K:4.0.1580-20150629 (KDI Version) allows unauthenticated attackers to remotely execute code via the lang parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://pwnedchile.com/2020/01/08/pixelstor-5000-rce-exploit/)
2. [](http://packetstormsecurity.com/files/155898/PixelStor-5000-K-4.0.1580-20150629-Remote-Code-Execution.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2002-2279, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2002-2279 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-2279
- **State**: PUBLISHED
- **Published Date**: October 18, 2007 at 10:00 UTC
- **Last Updated**: August 08, 2024 at 03:59 UTC
- **Reserved Date**: October 17, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in the bind function in config.inc of aldap 0.09 allows remote attackers to authenticate with Manager permissions.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://alcastle.com/index.php?id=6&subject=%2Faldap%2F&view=CHANGE.LOG.txt)
2. [6310](http://www.securityfocus.com/bid/6310)
3. [aldap-bind-manager-access(10733)](https://exchange.xforce.ibmcloud.com/vulnerabilities/10733)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-2674, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-2674 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-2674
- **State**: PUBLISHED
- **Published Date**: July 27, 2018 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 14:02 UTC
- **Reserved Date**: December 01, 2016 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
JBoss BRMS 6 and BPM Suite 6 before 6.4.3 are vulnerable to a stored XSS via several lists in Business Central. The flaw is due to lack of sanitation of user input when creating new lists. Remote, authenticated attackers that have privileges to create lists can store scripts in them, which are not properly sanitized before showing to other users, including admins.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Red Hat - business-central**
Affected versions:
- 6.4.3 (Status: affected)
### References
1. [RHSA-2017:1217](https://access.redhat.com/errata/RHSA-2017:1217)
2. [RHSA-2017:1218](https://access.redhat.com/errata/RHSA-2017:1218)
3. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2674)
4. [98390](http://www.securityfocus.com/bid/98390)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-30827, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-30827 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-30827
- **State**: PUBLISHED
- **Published Date**: April 01, 2025 at 05:31 UTC
- **Last Updated**: April 01, 2025 at 13:15 UTC
- **Reserved Date**: March 26, 2025 at 09:20 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Saleswonder Team Tobias WP2LEADS allows Reflected XSS. This issue affects WP2LEADS: from n/a through 3.4.5.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Saleswonder Team Tobias - WP2LEADS**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/wp2leads/vulnerability/wordpress-wp2leads-plugin-3-4-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- johska (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-48527, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-48527 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-48527
- **State**: PUBLISHED
- **Published Date**: December 15, 2023 at 10:17 UTC
- **Last Updated**: May 21, 2025 at 14:12 UTC
- **Reserved Date**: November 16, 2023 at 23:29 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Adobe - Adobe Experience Manager**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-27770, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-27770 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-27770
- **State**: PUBLISHED
- **Published Date**: December 04, 2020 at 00:00 UTC
- **Last Updated**: August 04, 2024 at 16:18 UTC
- **Reserved Date**: October 27, 2020 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Due to a missing check for 0 value of `replace_extent`, it is possible for offset `p` to overflow in SubstituteString(), causing potential impact to application availability. This could be triggered by a crafted input file that is processed by ImageMagick. This flaw affects ImageMagick versions prior to 7.0.8-68.
### Weakness Classification (CWE)
- CWE-190: Security Weakness
### Affected Products
**n/a - ImageMagick**
Affected versions:
- ImageMagick 7.0.8-68 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1894691)
2. [[debian-lts-announce] 20210323 [SECURITY] [DLA 2602-1] imagemagick security update](https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html)
3. [[debian-lts-announce] 20230311 [SECURITY] [DLA 3357-1] imagemagick security update](https://lists.debian.org/debian-lts-announce/2023/03/msg00008.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-35017, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-35017 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-35017
- **State**: PUBLISHED
- **Published Date**: January 29, 2025 at 00:00 UTC
- **Last Updated**: January 29, 2025 at 14:12 UTC
- **Reserved Date**: June 11, 2023 at 20:38 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Security Verify Governance 10.0.2 Identity Manager can transmit user credentials in clear text that could be obtained by an attacker using man in the middle techniques.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-319: Security Weakness
### Affected Products
**IBM - Security Verify Governance**
Affected versions:
- 10.0.2 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/7172423)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2006-4890, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2006-4890 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-4890
- **State**: PUBLISHED
- **Published Date**: September 19, 2006 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 19:32 UTC
- **Reserved Date**: September 19, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple PHP remote file inclusion vulnerabilities in UNAK-CMS 1.5 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the dirroot parameter to (1) fckeditor/editor/filemanager/browser/default/connectors/php/connector.php or (2) fckeditor/editor/dialog/fck_link.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [21957](http://secunia.com/advisories/21957)
2. [2380](https://www.exploit-db.com/exploits/2380)
3. [](http://www.unak.net/forum/viewtopic.php?id=165)
4. [20070](http://www.securityfocus.com/bid/20070)
5. [unakcms-fcklink-file-include(28986)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28986)
6. [ADV-2006-3657](http://www.vupen.com/english/advisories/2006/3657)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-31735, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-31735 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-31735
- **State**: PUBLISHED
- **Published Date**: April 01, 2025 at 14:51 UTC
- **Last Updated**: April 01, 2025 at 20:36 UTC
- **Reserved Date**: April 01, 2025 at 13:18 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in C. Johnson Footnotes for WordPress allows Stored XSS. This issue affects Footnotes for WordPress: from n/a through 2016.1230.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**C. Johnson - Footnotes for WordPress**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/footnotes-for-wordpress/vulnerability/wordpress-footnotes-for-wordpress-plugin-2016-1230-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- 0xd4rk5id3 (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-3966, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-3966 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3966
- **State**: PUBLISHED
- **Published Date**: April 04, 2018 at 13:00 UTC
- **Last Updated**: September 16, 2024 at 18:13 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: trellix
### Vulnerability Description
Exploitation of session variables, resource IDs and other trusted credentials vulnerability in the web interface in McAfee Network Security Management (NSM) before 8.2.7.42.2 allows remote attackers to exploit or harm a user's browser via reusing the exposed session token in the application URL.
### Affected Products
**McAfee - Network Security Management (NSM)**
Affected versions:
- 8.2 (Status: affected)
### References
1. [](https://kc.mcafee.com/corporate/index?page=content&id=SB10192)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-37081, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-37081 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-37081
- **State**: PUBLISHED
- **Published Date**: August 25, 2022 at 14:03 UTC
- **Last Updated**: August 03, 2024 at 10:21 UTC
- **Reserved Date**: August 01, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TOTOLINK A7000R V9.1.0u.6115_B20201022 was discovered to contain a command injection vulnerability via the command parameter at setting/setTracerouteCfg.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Darry-lang1/vuln/tree/main/TOTOLINK/A7000R/2)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2008-2858, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2008-2858 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2858
- **State**: PUBLISHED
- **Published Date**: June 25, 2008 at 10:00 UTC
- **Last Updated**: September 16, 2024 at 20:31 UTC
- **Reserved Date**: June 24, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in index.php in WebChamado 1.1 allows remote attackers to execute arbitrary SQL commands via the eml parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [30690](http://secunia.com/advisories/30690)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-6806, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-6806 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6806
- **State**: PUBLISHED
- **Published Date**: October 02, 2017 at 13:00 UTC
- **Last Updated**: September 16, 2024 at 20:57 UTC
- **Reserved Date**: August 12, 2016 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
Apache Wicket 6.x before 6.25.0, 7.x before 7.5.0, and 8.0.0-M1 provide a CSRF prevention measure that fails to discover some cross origin requests. The mitigation is to not only check the Origin HTTP header, but also take the Referer HTTP header into account when no Origin was provided. Furthermore, not all Wicket server side targets were subjected to the CSRF check. This was also fixed.
### Affected Products
**Apache Software Foundation - Apache Wicket**
Affected versions:
- 6.20.0 (Status: affected)
- 6.21.0 (Status: affected)
- 6.22.0 (Status: affected)
- 6.23.0 (Status: affected)
- 6.24.0 (Status: affected)
- 7.0.0 (Status: affected)
- 7.1.0 (Status: affected)
- 7.2.0 (Status: affected)
- 7.3.0 (Status: affected)
- 7.4.0 (Status: affected)
- 8.0.0-M1 (Status: affected)
### References
1. [[wicket-announce] 20161108 CVE-2016-6806: Apache Wicket CSRF detection vulnerability](https://lists.apache.org/thread.html/074b72585f4b7c6adda1af52aecbfe1be23c6d6f5bb9382270f059cd%40%3Cannounce.apache.org%3E)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-1435, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-1435 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-1435
- **State**: PUBLISHED
- **Published Date**: March 05, 2025 at 08:21 UTC
- **Last Updated**: March 05, 2025 at 14:26 UTC
- **Reserved Date**: February 18, 2025 at 14:54 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The bbPress plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.6.11. This is due to missing or incorrect nonce validation on the bbp_user_add_role_on_register() function. This makes it possible for unauthenticated attackers to elevate their privileges to that of a bbPress Keymaster via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Rather than implementing a nonce check to provide protection against this vulnerability, which would break functionality, the plugin no longer makes it possible to select a role during registration.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**johnjamesjacoby - bbPress**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/2d776d94-8c81-4e88-bae3-946824a75c09?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/bbpress/trunk/includes/users/signups.php#L151)
3. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3247345%40bbpress&new=3247345%40bbpress&sfp_email=&sfph_mail=)
4. [](https://plugins.trac.wordpress.org/changeset/3247345/bbpress/branches/2.6/includes/users/capabilities.php)
### Credits
- Brian Mungai
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2012-5517, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2012-5517 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-5517
- **State**: PUBLISHED
- **Published Date**: December 21, 2012 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 21:05 UTC
- **Reserved Date**: October 24, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.kernel.org/pub/linux/kernel/v3.x/patch-3.6.bz2)
2. [USN-1679-1](http://www.ubuntu.com/usn/USN-1679-1)
3. [RHSA-2012:1580](http://rhn.redhat.com/errata/RHSA-2012-1580.html)
4. [](http://www.kernel.org/pub/linux/kernel/v3.x/)
5. [SUSE-SU-2012:1679](https://www.suse.com/support/update/announcement/2012/suse-su-20121679-1.html)
6. [USN-1673-1](http://www.ubuntu.com/usn/USN-1673-1)
7. [](https://github.com/torvalds/linux/commit/08dff7b7d629807dbb1f398c68dd9cd58dd657a1)
8. [[oss-security] 20121113 Re: CVE request -- Linux kernel: mm/hotplug: failure in propagating hot-added memory to other nodes](http://www.openwall.com/lists/oss-security/2012/11/13/11)
9. [USN-1678-1](http://www.ubuntu.com/usn/USN-1678-1)
10. [](http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=08dff7b7d629807dbb1f398c68dd9cd58dd657a1)
11. [56527](http://www.securityfocus.com/bid/56527)
12. [USN-1671-1](http://www.ubuntu.com/usn/USN-1671-1)
13. [openSUSE-SU-2013:0925](http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html)
14. [USN-1677-1](http://www.ubuntu.com/usn/USN-1677-1)
15. [](https://bugzilla.redhat.com/show_bug.cgi?id=875374)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-4024, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-4024 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-4024
- **State**: PUBLISHED
- **Published Date**: May 13, 2019 at 15:42 UTC
- **Last Updated**: August 05, 2024 at 05:04 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
An exploitable denial-of-service vulnerability exists in the thumbnail display functionality of the NT9665X Chipset firmware, running on the Anker Roav A1 Dashcam, version RoavA1SWV1.9. A specially crafted packet can cause a null pointer dereference, resulting in a device reboot.
### Affected Products
**n/a - Novatek**
Affected versions:
- Anker Roav A1 Dashcam RoavA1SWV1.9 (Status: affected)
### References
1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2018-0696)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-4555, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-4555 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-4555
- **State**: PUBLISHED
- **Published Date**: August 28, 2024 at 06:27 UTC
- **Last Updated**: August 28, 2024 at 13:27 UTC
- **Reserved Date**: May 06, 2024 at 17:46 UTC
- **Assigned By**: OpenText
### Vulnerability Description
Improper Privilege Management vulnerability in OpenText NetIQ Access Manager allows user account impersonation in specific scenario. This issue affects NetIQ Access Manager before 5.0.4.1 and before 5.1
### CVSS Metrics
- **CVSS Base Score**: 7.7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-269: Security Weakness
### Affected Products
**OpenText - NetIQ Access Manager**
Affected versions:
- 5.0.4.1 (Status: affected)
- 5.1 (Status: affected)
### References
1. [](https://www.microfocus.com/documentation/access-manager/5.0/accessmanager504-p1-release-notes/accessmanager504-p1-release-notes.html)
2. [](https://www.microfocus.com/documentation/access-manager/5.1/accessmanager51-release-notes/accessmanager51-release-notes.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2013-0477, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2013-0477 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0477
- **State**: PUBLISHED
- **Published Date**: February 21, 2013 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 14:25 UTC
- **Reserved Date**: December 16, 2012 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in IBM InfoSphere Master Data Management - Collaborative Edition 10.0 and 10.1 before FP1 and InfoSphere Master Data Management Server for Product Information Management 6.0, 9.0, and 9.1 allow remote authenticated users to inject content, and conduct phishing attacks, via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21624952)
2. [mdm-web-content-spoofing(81481)](https://exchange.xforce.ibmcloud.com/vulnerabilities/81481)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-1144, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-1144 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1144
- **State**: PUBLISHED
- **Published Date**: August 14, 2019 at 20:55 UTC
- **Last Updated**: August 04, 2024 at 18:06 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploited the vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
There are multiple ways an attacker could exploit the vulnerability:
In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability and then convince users to view the website. An attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email or instant message that takes users to the attacker's website, or by opening an attachment sent through email.
In a file-sharing attack scenario, an attacker could provide a specially crafted document file designed to exploit the vulnerability and then convince users to open the document file.
The security update addresses the vulnerability by correcting how the Windows font library handles embedded fonts.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1703**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1803**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server, version 1803 (Server Core Installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1709 for 32-bit Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1709**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server, version 1903 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Systems Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1144)
2. [](http://packetstormsecurity.com/files/154085/Microsoft-Font-Subsetting-DLL-MergeFormat12Cmap-MakeFormat12MergedGlyphList-Double-Free.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2006-5782, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2006-5782 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-5782
- **State**: PUBLISHED
- **Published Date**: November 09, 2006 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 20:04 UTC
- **Reserved Date**: November 07, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
radexecd.exe in HP OpenView Client Configuraton Manager (CCM) does not require authentication before executing commands in the installation directory, which allows remote attackers to cause a denial of service (reboot) by calling radbootw.exe or create arbitrary files by calling radcrecv.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20061108 TSRT-06-13: HP OpenView Client Configuration Manager Device Code Execution Vulnerability](http://www.securityfocus.com/archive/1/450942/100/0/threaded)
2. [22780](http://secunia.com/advisories/22780)
3. [HPSBMA02167](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00795552)
4. [1842](http://securityreason.com/securityalert/1842)
5. [ADV-2006-4410](http://www.vupen.com/english/advisories/2006/4410)
6. [hp-openview-radianotify-dos(30138)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30138)
7. [SSRT061262](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00795552)
8. [1017197](http://securitytracker.com/id?1017197)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-17255, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-17255 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-17255
- **State**: PUBLISHED
- **Published Date**: October 08, 2019 at 11:20 UTC
- **Last Updated**: August 05, 2024 at 01:33 UTC
- **Reserved Date**: October 06, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
IrfanView 4.53 allows a User Mode Write AV starting at EXR!ReadEXR+0x0000000000010836.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.irfanview.com/main_history.htm)
2. [](https://github.com/linhlhq/research/blob/master/README.md)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-26862, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-26862 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-26862
- **State**: REJECTED
- **Last Updated**: October 13, 2022 at 00:00 UTC
- **Reserved Date**: October 07, 2020 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-28045, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-28045 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-28045
- **State**: PUBLISHED
- **Published Date**: March 21, 2024 at 22:24 UTC
- **Last Updated**: August 02, 2024 at 00:48 UTC
- **Reserved Date**: March 12, 2024 at 15:07 UTC
- **Assigned By**: icscert
### Vulnerability Description
Improper neutralization of input within the affected product could lead to cross-site scripting.
### CVSS Metrics
- **CVSS Base Score**: 4.6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Delta Electronics - DIAEnergie**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-12)
### Credits
- Michael Heinzl reported these vulnerabilities to CISA.
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-32779, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-32779 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-32779
- **State**: REJECTED
- **Last Updated**: May 08, 2023 at 00:00 UTC
- **Reserved Date**: June 09, 2022 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-3290, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-3290 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-3290
- **State**: PUBLISHED
- **Published Date**: May 17, 2024 at 16:54 UTC
- **Last Updated**: August 01, 2024 at 20:05 UTC
- **Reserved Date**: April 03, 2024 at 21:12 UTC
- **Assigned By**: tenable
### Vulnerability Description
A race condition vulnerability exists where an authenticated, local attacker on a Windows Nessus host could modify installation parameters at installation time, which could lead to the execution of arbitrary code on the Nessus host
### CVSS Metrics
- **CVSS Base Score**: 8.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-367: Security Weakness
### Affected Products
**Tenable - Nessus**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.tenable.com/security/tns-2024-08)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-6681, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-6681 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-6681
- **State**: PUBLISHED
- **Published Date**: December 23, 2019 at 17:10 UTC
- **Last Updated**: August 04, 2024 at 20:31 UTC
- **Reserved Date**: January 22, 2019 at 00:00 UTC
- **Assigned By**: f5
### Vulnerability Description
On BIG-IP versions 15.0.0-15.0.1.1, 14.1.0-14.1.2, 14.0.0-14.0.1, 13.1.0-13.1.3.1, and 12.1.0-12.1.5, a memory leak in Multicast Forwarding Cache (MFC) handling in tmrouted.
### Affected Products
**F5 - BIG-IP**
Affected versions:
- 15.0.0-15.0.1.1 (Status: affected)
- 14.1.0-14.1.2 (Status: affected)
- 14.0.0-14.0.1 (Status: affected)
- 13.1.0-13.1.3.1 (Status: affected)
- 12.1.0-12.1.5 (Status: affected)
### References
1. [](https://support.f5.com/csp/article/K93417064)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-57548, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-57548 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-57548
- **State**: PUBLISHED
- **Published Date**: January 27, 2025 at 00:00 UTC
- **Last Updated**: January 28, 2025 at 19:38 UTC
- **Reserved Date**: January 09, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
CMSimple 5.16 allows the user to edit log.php file via print page.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/h4ckr4v3n/cmsimple5.16_research/blob/main/CMSimple%205.16%20Broken%20Access%20Control%20to%20log.php.md)
2. [](https://gist.github.com/h4ckr4v3n/afbb87b5a05f283dbee705709c2769eb)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-22023, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-22023 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-22023
- **State**: PUBLISHED
- **Published Date**: August 30, 2021 at 17:53 UTC
- **Last Updated**: August 03, 2024 at 18:30 UTC
- **Reserved Date**: January 04, 2021 at 00:00 UTC
- **Assigned By**: vmware
### Vulnerability Description
The vRealize Operations Manager API (8.x prior to 8.5) has insecure object reference vulnerability. A malicious actor with administrative access to vRealize Operations Manager API may be able to modify other users information leading to an account takeover.
### Affected Products
**n/a - VMware vRealize Operations**
Affected versions:
- VMware vRealize Operations (8.x prior to 8.5) (Status: affected)
### References
1. [](https://www.vmware.com/security/advisories/VMSA-2021-0018.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-15268, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-15268 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-15268
- **State**: PUBLISHED
- **Published Date**: October 16, 2019 at 18:36 UTC
- **Last Updated**: November 21, 2024 at 19:07 UTC
- **Reserved Date**: August 20, 2019 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Cisco - Cisco Firepower Management Center**
Affected versions:
- unspecified (Status: affected)
### References
1. [20191016 Cisco Firepower Management Center Multiple Cross-Site Scripting Vulnerabilities](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-firepwr-xss)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-30744, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-30744 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-30744
- **State**: PUBLISHED
- **Published Date**: June 07, 2022 at 18:19 UTC
- **Last Updated**: August 03, 2024 at 06:56 UTC
- **Reserved Date**: May 16, 2022 at 00:00 UTC
- **Assigned By**: Samsung Mobile
### Vulnerability Description
DLL hijacking vulnerability in KiesWrapper in Samsung Kies prior to version 2.6.4.22043_1 allows attacker to execute arbitrary code.
### CVSS Metrics
- **CVSS Base Score**: 6.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Samsung Mobile - Samsung Kies**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://security.samsungmobile.com/serviceWeb.smsb?year=2022&month=6)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-5879, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-5879 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5879
- **State**: PUBLISHED
- **Published Date**: April 30, 2020 at 20:46 UTC
- **Last Updated**: August 04, 2024 at 08:47 UTC
- **Reserved Date**: January 06, 2020 at 00:00 UTC
- **Assigned By**: f5
### Vulnerability Description
On BIG-IP ASM 11.6.1-11.6.5.1, under certain configurations, the BIG-IP system sends data plane traffic to back-end servers unencrypted, even when a Server SSL profile is applied.
### Affected Products
**n/a - BIG-IP ASM**
Affected versions:
- 11.6.1-11.6.5.1 (Status: affected)
### References
1. [](https://support.f5.com/csp/article/K88474783)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-10403, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-10403 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-10403
- **State**: PUBLISHED
- **Published Date**: March 12, 2020 at 13:04 UTC
- **Last Updated**: August 04, 2024 at 10:58 UTC
- **Reserved Date**: March 12, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/edit-comment.php by adding a question mark (?) followed by the payload.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://antoniocannito.it/?p=137#uxss)
2. [](https://antoniocannito.it/phpkb1#reflected-cross-site-scripting-in-every-admin-page-cve-block-going-from-cve-2020-10391-to-cve-2020-10456)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2008-0865, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2008-0865 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0865
- **State**: PUBLISHED
- **Published Date**: February 21, 2008 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 08:01 UTC
- **Reserved Date**: February 20, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in BEA WebLogic Portal 8.1 through SP6 allows remote attackers to bypass entitlements for instances of a floatable WLP portlet via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [BEA08-184.00](http://dev2dev.bea.com/pub/advisory/257)
2. [ADV-2008-0613](http://www.vupen.com/english/advisories/2008/0613)
3. [29041](http://secunia.com/advisories/29041)
4. [1019451](http://www.securitytracker.com/id?1019451)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-0919, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-0919 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0919
- **State**: PUBLISHED
- **Published Date**: December 15, 2021 at 18:05 UTC
- **Last Updated**: August 03, 2024 at 15:55 UTC
- **Reserved Date**: November 06, 2020 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In getService of IServiceManager.cpp, there is a possible unhandled exception due to an integer overflow. This could lead to local denial of service making the lockscreen unusable with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-197336441
### Affected Products
**n/a - Android**
Affected versions:
- Android-10 Android-11 Android-9 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2021-11-01)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-29034, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-29034 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-29034
- **State**: REJECTED
- **Last Updated**: April 02, 2023 at 00:00 UTC
- **Reserved Date**: March 30, 2023 at 00:00 UTC
- **Assigned By**: STAR_Labs
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-3408, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-3408 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-3408
- **State**: PUBLISHED
- **Published Date**: April 08, 2025 at 04:00 UTC
- **Last Updated**: April 08, 2025 at 15:47 UTC
- **Reserved Date**: April 07, 2025 at 10:55 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Nothings stb up to f056911. It has been rated as critical. Affected by this issue is the function stb_dupreplace. The manipulation leads to integer overflow. The attack may be launched remotely. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-190: Security Weakness
- CWE-189: Security Weakness
### Affected Products
**Nothings - stb**
Affected versions:
- f056911 (Status: affected)
### References
1. [VDB-303686 | Nothings stb stb_dupreplace integer overflow](https://vuldb.com/?id.303686)
2. [VDB-303686 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.303686)
3. [Submit #544230 | Open Source STB Project (https://github.com/nothings/stb) Latest (<= commit f056911) stb_dupreplace Integer Overflow -> Under Allocation](https://vuldb.com/?submit.544230)
### Credits
- ninpwn (VulDB User)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-10590, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-10590 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-10590
- **State**: PUBLISHED
- **Published Date**: February 07, 2020 at 05:00 UTC
- **Last Updated**: August 04, 2024 at 22:24 UTC
- **Reserved Date**: March 29, 2019 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Out of bound access while parsing dts atom, which is non-standard as it does not have valid number of tracks in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8064, APQ8096AU, APQ8098, MDM9206, MDM9207C, MDM9607, MSM8905, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8939, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCS405, QCS605, QM215, Rennell, SA6155P, Saipan, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables**
Affected versions:
- APQ8009, APQ8017, APQ8053, APQ8064, APQ8096AU, APQ8098, MDM9206, MDM9207C, MDM9607, MSM8905, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8939, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCS405, QCS605, QM215, Rennell, SA6155P, Saipan, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/february-2020-bulletin)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-6019, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-6019 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-6019
- **State**: PUBLISHED
- **Published Date**: March 06, 2018 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 05:54 UTC
- **Reserved Date**: January 22, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Samsung Display Solutions App before 3.02 for Android allows man-in-the-middle attackers to spoof B2B content by leveraging failure to use encryption during information transmission.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wwws.nightwatchcybersecurity.com/2018/03/01/content-injection-in-samsung-display-solutions-application-for-android-cve-2018-6019/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2006-2047, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2006-2047 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-2047
- **State**: PUBLISHED
- **Published Date**: April 26, 2006 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 17:35 UTC
- **Reserved Date**: April 26, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Application Dynamics Cartweaver ColdFusion 2.16.11 and earlier allows remote attackers to obtain sensitive information via an invalid (1) secondary, (2) PageNum_Results, (3) category, or (4) keywords parameter in (a) Results.cfm; or an invalid (5) ProdID parameter in (b) Details.cfm; which reveal the path in various error messages. NOTE: the behavior for the category, keywords, and ProdID parameters might be resultant from SQL injection.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [cartweaver-multiple-path-disclosure(26061)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26061)
2. [ADV-2006-1513](http://www.vupen.com/english/advisories/2006/1513)
3. [24963](http://www.osvdb.org/24963)
4. [19812](http://secunia.com/advisories/19812)
5. [](http://pridels0.blogspot.com/2006/04/cartweaver-coldfusion-vuln.html)
6. [24964](http://www.osvdb.org/24964)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-6568, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-6568 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6568
- **State**: PUBLISHED
- **Published Date**: August 21, 2024 at 05:30 UTC
- **Last Updated**: August 21, 2024 at 17:10 UTC
- **Reserved Date**: July 08, 2024 at 15:31 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Flamix: Bitrix24 and Contact Form 7 integrations plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 3.1.0. This is due the plugin utilizing mobiledetect without preventing direct access to the files. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**flamix - Flamix: Bitrix24 and Contact Form 7 integrations**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/da2050ea-70b3-476d-841f-021c3baddf35?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/flamix-bitrix24-and-contact-forms-7-integrations/trunk/includes/vendor/mobiledetect/mobiledetectlib/export/exportToJSON.php)
3. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3138051%40flamix-bitrix24-and-contact-forms-7-integrations&new=3138051%40flamix-bitrix24-and-contact-forms-7-integrations&sfp_email=&sfph_mail=)
### Credits
- Matthew Rollings
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-6853, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-6853 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6853
- **State**: PUBLISHED
- **Published Date**: March 24, 2016 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 07:36 UTC
- **Reserved Date**: September 10, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Domino web agent in CA Single Sign-On (aka SSO, formerly SiteMinder) R6, R12.0 before SP3 CR13, R12.0J before SP3 CR1.2, R12.5 before CR5, R12.51 before CR4, and R12.52 before SP1 CR3 allows remote attackers to cause a denial of service (daemon crash) or obtain sensitive information via a crafted request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1035389](http://www.securitytracker.com/id/1035389)
2. [](http://www.ca.com/us/support/ca-support-online/product-content/recommended-reading/security-notices/ca20160323-01-security-notice-for-ca-single-sign-on-web-agents.aspx)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-45644, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-45644 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-45644
- **State**: PUBLISHED
- **Published Date**: December 02, 2022 at 00:00 UTC
- **Last Updated**: April 24, 2025 at 13:47 UTC
- **Reserved Date**: November 21, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the deviceId parameter in the formSetClientState function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_ac6/formSetClientState_deviceId/formSetClientState_deviceId.md)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-2971, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-2971 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2971
- **State**: PUBLISHED
- **Published Date**: September 23, 2022 at 15:28 UTC
- **Last Updated**: April 16, 2025 at 16:09 UTC
- **Reserved Date**: August 23, 2022 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
MZ Automation's libIEC61850 (versions 1.4 and prior; version 1.5 prior to commit a3b04b7bc4872a5a39e5de3fdc5fbde52c09e10e) accesses a resource using an incompatible type, which could allow an attacker to crash the server with a malicious payload.
### CVSS Metrics
- **CVSS Base Score**: 8.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-843: Security Weakness
### Affected Products
**MZ Automation - libIEC61850**
Affected versions:
- All (Status: affected)
- Version 1.5 (Status: affected)
### References
1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-22-251-01)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-3933, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-3933 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3933
- **State**: PUBLISHED
- **Published Date**: June 02, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 10:57 UTC
- **Reserved Date**: June 02, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the address components field formatter in the AddressField Tokens module 7.x-1.x before 7.x-1.4 for Drupal allows remote authenticated users to inject arbitrary web script or HTML via an address field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://drupal.org/node/2267475)
2. [67545](http://www.securityfocus.com/bid/67545)
3. [](https://drupal.org/node/2267485)
4. [58399](http://secunia.com/advisories/58399)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-38374, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-38374 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-38374
- **State**: PUBLISHED
- **Published Date**: November 02, 2022 at 00:00 UTC
- **Last Updated**: October 25, 2024 at 13:20 UTC
- **Reserved Date**: August 16, 2022 at 00:00 UTC
- **Assigned By**: fortinet
### Vulnerability Description
A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiADC 7.0.0 - 7.0.2 and 6.2.0 - 6.2.4 allows an attacker to execute unauthorized code or commands via the URL and User fields observed in the traffic and event logviews.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:R`
### Affected Products
**Fortinet - Fortinet FortiADC**
Affected versions:
- FortiADC 7.0.2, 7.0.1, 7.0.0, 6.2.4, 6.2.3, 6.2.2, 6.2.1, 6.2.0 (Status: affected)
### References
1. [](https://fortiguard.com/psirt/FG-IR-22-232)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2010-0422, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2010-0422 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-0422
- **State**: PUBLISHED
- **Published Date**: February 24, 2010 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 00:45 UTC
- **Reserved Date**: January 27, 2010 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
gnome-screensaver 2.28.x before 2.28.3 does not properly synchronize the state of screen locking and the unlock dialog in situations involving a change to the number of monitors, which allows physically proximate attackers to bypass screen locking and access an unattended workstation by connecting and disconnecting monitors multiple times, a related issue to CVE-2010-0414.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=564464)
2. [](https://bugzilla.gnome.org/show_bug.cgi?id=609789)
3. [[oss-security] 20100212 Re: gnome-screensaver vulnerability (CVE-2010-0414)](http://marc.info/?l=oss-security&m=126601292400764&w=2)
4. [](http://ftp.gnome.org/pub/GNOME/sources/gnome-screensaver/2.28/gnome-screensaver-2.28.3.news)
5. [gnome-screensaver-monitor-sec-bypass(56364)](https://exchange.xforce.ibmcloud.com/vulnerabilities/56364)
6. [FEDORA-2010-1855](http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035115.html)
7. [38565](http://secunia.com/advisories/38565)
8. [](http://git.gnome.org/browse/gnome-screensaver/commit/?id=d4dcbd65a2df3c093c4e3a74bbbc75383eb9eadb)
9. [38583](http://secunia.com/advisories/38583)
10. [](http://git.gnome.org/browse/gnome-screensaver/commit/?id=271ae93d7b140b8ba40d77f9e4ce894e5fd1b554)
11. [38248](http://www.securityfocus.com/bid/38248)
12. [](http://git.gnome.org/browse/gnome-screensaver/commit/?id=f93a22c175090cf02e80bc3ee676b53f1251f685)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-10447, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-10447 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-10447
- **State**: PUBLISHED
- **Published Date**: April 18, 2018 at 14:00 UTC
- **Last Updated**: September 16, 2024 at 19:10 UTC
- **Reserved Date**: August 16, 2017 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear MDM9206, MDM9607, MDM9650, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820, SD 835, and SDX20, secure UI crash due to uninitialized link list entry in dynamic font module.
### Affected Products
**Qualcomm, Inc. - Snapdragon Mobile, Snapdragon Wear**
Affected versions:
- MDM9206, MDM9607, MDM9650, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820, SD 835, SDX20 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2018-04-01)
2. [103671](http://www.securityfocus.com/bid/103671)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-22448, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-22448 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-22448
- **State**: PUBLISHED
- **Published Date**: April 10, 2024 at 07:30 UTC
- **Last Updated**: August 01, 2024 at 22:43 UTC
- **Reserved Date**: January 10, 2024 at 15:26 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell BIOS contains an Out-of-Bounds Write vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to denial of service.
### CVSS Metrics
- **CVSS Base Score**: 4.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H`
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Dell - CPG BIOS**
Affected versions:
- N/A (Status: affected)
- N/A (Status: affected)
- N/A (Status: affected)
- N/A (Status: affected)
- N/A (Status: affected)
- N/A (Status: affected)
- N/A (Status: affected)
- N/A (Status: affected)
- N/A (Status: affected)
- N/A (Status: affected)
- N/A (Status: affected)
- N/A (Status: affected)
- N/A (Status: affected)
- N/A (Status: affected)
- N/A (Status: affected)
- N/A (Status: affected)
- N/A (Status: affected)
- N/A (Status: affected)
- N/A (Status: affected)
- N/A (Status: affected)
- N/A (Status: affected)
- N/A (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/en-us/000221744/dsa-2024-066)
### Credits
- Dell Technologies would like to thank Eason for reporting this issue.
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-21404, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-21404 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21404
- **State**: PUBLISHED
- **Published Date**: May 08, 2023 at 00:00 UTC
- **Last Updated**: January 29, 2025 at 16:13 UTC
- **Reserved Date**: November 04, 2022 at 00:00 UTC
- **Assigned By**: Axis
### Vulnerability Description
AXIS OS 11.0.X - 11.3.x use a static RSA key in legacy LUA-components to protect Axis-specific source code. The static RSA key is not used in any other secure communication nor can it be used to compromise the device or any customer data.
### Weakness Classification (CWE)
- CWE-321: Security Weakness
### Affected Products
**Axis Communications AB - AXIS OS**
Affected versions:
- AXIS OS 11.0.X - 11.3.x (Status: affected)
### References
1. [](https://www.axis.com/dam/public/07/0a/20/cve-2023-21404-en-US-398426.pdf)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2011-2287, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2011-2287 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-2287
- **State**: PUBLISHED
- **Published Date**: July 21, 2011 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 22:53 UTC
- **Reserved Date**: June 02, 2011 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in Oracle Solaris 8, 9, 10, and 11 Express allows remote attackers to affect availability via unknown vectors related to fingerd.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [TA11-201A](http://www.us-cert.gov/cas/techalerts/TA11-201A.html)
2. [](http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-23439, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-23439 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-23439
- **State**: PUBLISHED
- **Published Date**: December 29, 2023 at 02:44 UTC
- **Last Updated**: August 02, 2024 at 10:28 UTC
- **Reserved Date**: January 12, 2023 at 04:00 UTC
- **Assigned By**: Honor
### Vulnerability Description
Some Honor products are affected by information leak vulnerability, successful exploitation could cause the information leak.
### CVSS Metrics
- **CVSS Base Score**: 4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L`
### Affected Products
**Honor - LGE-AN00 **
Affected versions:
- 6.0.0.183 (Status: affected)
### References
1. [](https://www.hihonor.com/global/security/cve-2023-23439/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-9574, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-9574 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9574
- **State**: PUBLISHED
- **Published Date**: March 05, 2019 at 21:00 UTC
- **Last Updated**: August 04, 2024 at 21:54 UTC
- **Reserved Date**: March 05, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The WP Human Resource Management plugin before 2.2.6 for WordPress does not ensure that a leave modification occurs in the context of the Administrator or HR Manager role.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wordpress.org/plugins/hrm/#developers)
2. [[oss-security] 20190317 CVE-2019-9573 / CVE-2019-9574: WordPress plugin hrm missing server side authorization checks](http://www.openwall.com/lists/oss-security/2019/03/17/1)
3. [107464](http://www.securityfocus.com/bid/107464)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2005-2012, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2005-2012 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2012
- **State**: PUBLISHED
- **Published Date**: June 20, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:15 UTC
- **Reserved Date**: June 20, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in login in paFAQ 1.0 Beta 4 allow remote attackers to execute arbitrary SQL commands and bypass authentication via the (1) username or (2) id parameters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20050620 paFaq Multiple Vulnerabilities](http://marc.info/?l=bugtraq&m=111928841328681&w=2)
2. [](http://www.gulftech.org/?node=research&article_id=00083-06202005)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-20475, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-20475 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-20475
- **State**: PUBLISHED
- **Published Date**: September 25, 2024 at 16:19 UTC
- **Last Updated**: September 25, 2024 at 18:35 UTC
- **Reserved Date**: November 08, 2023 at 15:08 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the web-based management interface of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.
This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by inserting malicious data into a specific data field in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Affected Products
**Cisco - Cisco Catalyst SD-WAN Manager**
Affected versions:
- 20.6.1 (Status: affected)
- 20.6.1.1 (Status: affected)
- 20.6.0.18.3 (Status: affected)
- 20.6.0.18.4 (Status: affected)
- 20.6.1.0.1 (Status: affected)
- 20.6.2 (Status: affected)
- 20.7.1EFT2 (Status: affected)
- 20.7.1 (Status: affected)
- 20.6.2.1 (Status: affected)
- 20.6.2.2 (Status: affected)
- 20.7.1.1 (Status: affected)
- 20.6.2.2.2 (Status: affected)
- 20.6.2.2.3 (Status: affected)
- 20.6.2.0.4 (Status: affected)
- 20.6.2.2.7 (Status: affected)
- 20.6.3 (Status: affected)
- 20.7.1.0.2 (Status: affected)
- 20.8.1 (Status: affected)
- 20.6.3.0.7 (Status: affected)
- 20.6.3.0.5 (Status: affected)
- 20.6.3.0.10 (Status: affected)
- 20.6.3.0.2 (Status: affected)
- 20.7.2 (Status: affected)
- 20.6.3.0.11 (Status: affected)
- 20.6.3.0.14 (Status: affected)
- 20.6.3.0.19 (Status: affected)
- 20.6.3.0.18 (Status: affected)
- 20.6.3.0.23 (Status: affected)
- 20.6.3.0.25 (Status: affected)
- 20.6.3.0.27 (Status: affected)
- 20.6.3.0.29 (Status: affected)
- 20.10.1 (Status: affected)
- 20.6.3.0.33 (Status: affected)
- 20.9.1_LI_Images (Status: affected)
- 20.10.1_LI_Images (Status: affected)
- 20.9.3 (Status: affected)
- 20.6.5.1 (Status: affected)
- 20.11.1 (Status: affected)
- 20.11.1_LI_Images (Status: affected)
- 20.9.3_LI_ Images (Status: affected)
- 20.6.3.1.1 (Status: affected)
- 20.9.3.0.3 (Status: affected)
- 20.6.3.2 (Status: affected)
- 20.6.4.1 (Status: affected)
- 20.6.3.0.39 (Status: affected)
- 20.6.5.2 (Status: affected)
- 20.10.1.1 (Status: affected)
- 20.6.2.2.4 (Status: affected)
- 20.6.1.2 (Status: affected)
- 20.11.1.1 (Status: affected)
- 20.6.3.0.40 (Status: affected)
- 20.9.2.2 (Status: affected)
- 20.6.5.2.3 (Status: affected)
- 20.6.5.1.5 (Status: affected)
- 20.9.3.0.4 (Status: affected)
- 20.6.4.0.19 (Status: affected)
- 20.6.3.3 (Status: affected)
- 20.6.5.4 (Status: affected)
- 20.6.5.1.7 (Status: affected)
- 20.9.3.0.12 (Status: affected)
- 20.11.1.2 (Status: affected)
- 20.6.3.4 (Status: affected)
- 20.10.1.2 (Status: affected)
- 20.6.5.1.10 (Status: affected)
- 20.6.5.2.4 (Status: affected)
- 20.9.3.0.18 (Status: affected)
- 20.6.3.0.47 (Status: affected)
- 20.9.2.3 (Status: affected)
- 20.9.3.0.21 (Status: affected)
- 20.9.4_LI_Images (Status: affected)
- 20.9.4 (Status: affected)
- 20.6.5.1.11 (Status: affected)
- 20.12.1 (Status: affected)
- 20.12.1_LI_Images (Status: affected)
- 20.9.3.0.23 (Status: affected)
- 20.9.4.1 (Status: affected)
- 20.9.4.1_LI_Images (Status: affected)
- 20.9.3.0.25 (Status: affected)
- 20.9.3.0.24 (Status: affected)
- 20.6.5.1.14 (Status: affected)
- 20.9.3.0.26 (Status: affected)
- 20.6.3.0.51 (Status: affected)
- 20.12.2 (Status: affected)
- 20.12.2_LI_Images (Status: affected)
- 20.6.6.0.1 (Status: affected)
- 20.13.1_LI_Images (Status: affected)
- 20.9.4.0.4 (Status: affected)
- 20.13.1 (Status: affected)
- 20.9.4.1.1 (Status: affected)
- 20.9.5 (Status: affected)
- 20.9.5_LI_Images (Status: affected)
- 20.12.3_LI_Images (Status: affected)
- 20.12.3 (Status: affected)
- 20.9.4.1.3 (Status: affected)
- 20.6.7 (Status: affected)
- 20.9.5.1 (Status: affected)
- 20.9.5.1_LI_Images (Status: affected)
- 20.14.1 (Status: affected)
- 20.14.1_LI_Images (Status: affected)
- 20.9.5.2_LI_Images (Status: affected)
- 20.12.3.1 (Status: affected)
- 20.12.4 (Status: affected)
### References
1. [cisco-sa-sdwan-xss-zQ4KPvYd](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-xss-zQ4KPvYd)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2000-0489, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2000-0489 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-0489
- **State**: PUBLISHED
- **Published Date**: October 13, 2000 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 05:21 UTC
- **Reserved Date**: July 11, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
FreeBSD, NetBSD, and OpenBSD allow an attacker to cause a denial of service by creating a large number of socket pairs using the socketpair function, setting a large buffer size via setsockopt, then writing large buffers.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [bsd-setsockopt-dos(3298)](https://exchange.xforce.ibmcloud.com/vulnerabilities/3298)
2. [622](http://www.securityfocus.com/bid/622)
3. [20000601 Local FreeBSD, Openbsd, NetBSD, DoS Vulnerability - Mac OS X affected](http://www.securityfocus.com/templates/archive.pike?list=1&msg=NCBBKFKDOLAGKIAPMILPCEJLCEAA.labs%40ussrback.com)
4. [19990826 Local DoS in FreeBSD](http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.4.10.9908270039010.16315-100000%40thetis.deor.org)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-0084, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-0084 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-0084
- **State**: PUBLISHED
- **Published Date**: March 11, 2015 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 03:55 UTC
- **Reserved Date**: November 18, 2014 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
The Task Scheduler in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly constrain impersonation levels, which allows local users to bypass intended restrictions on launching executable files via a crafted task, aka "Task Scheduler Security Feature Bypass Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS15-028](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-028)
2. [1031893](http://www.securitytracker.com/id/1031893)
3. [72913](http://www.securityfocus.com/bid/72913)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-24357, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-24357 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-24357
- **State**: PUBLISHED
- **Published Date**: February 18, 2022 at 19:52 UTC
- **Last Updated**: August 03, 2024 at 04:07 UTC
- **Reserved Date**: February 02, 2022 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.1.0.52543. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15743.
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Foxit - PDF Reader**
Affected versions:
- 11.1.0.52543 (Status: affected)
### References
1. [](https://www.foxit.com/support/security-bulletins.html)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-22-268/)
### Credits
- Rich
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-40117, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-40117 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-40117
- **State**: PUBLISHED
- **Published Date**: October 27, 2023 at 20:22 UTC
- **Last Updated**: April 29, 2025 at 19:59 UTC
- **Reserved Date**: August 09, 2023 at 02:29 UTC
- **Assigned By**: google_android
### Vulnerability Description
In resetSettingsLocked of SettingsProvider.java, there is a possible lockscreen bypass due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
### Affected Products
**Google - Android**
Affected versions:
- 13 (Status: affected)
- 12L (Status: affected)
- 12 (Status: affected)
- 11 (Status: affected)
### References
1. [](https://android.googlesource.com/platform/packages/apps/Settings/+/11815817de2f2d70fe842b108356a1bc75d44ffb)
2. [](https://android.googlesource.com/platform/frameworks/base/+/ff86ff28cf82124f8e65833a2dd8c319aea08945)
3. [](https://source.android.com/security/bulletin/2023-10-01)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2001-0211, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2001-0211 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0211
- **State**: PUBLISHED
- **Published Date**: March 09, 2001 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 04:14 UTC
- **Reserved Date**: March 08, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in WebSPIRS 3.1 allows remote attackers to read arbitrary files via a .. (dot dot) attack on the sp.nextform parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20010212 WebSPIRS CGI script "show files" Vulnerability.](http://archives.neohapsis.com/archives/bugtraq/2001-02/0217.html)
2. [2362](http://www.securityfocus.com/bid/2362)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-15314, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-15314 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-15314
- **State**: PUBLISHED
- **Published Date**: March 09, 2018 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 19:50 UTC
- **Reserved Date**: October 14, 2017 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
Huawei DP300 V500R002C00, RP200 V500R002C00SPC200, V600R006C00, TE30 V100R001C10SPC300, V100R001C10SPC500, V100R001C10SPC600, V100R001C10SPC700, V500R002C00SPC200, V500R002C00SPC500, V500R002C00SPC600, V500R002C00SPC700, V500R002C00SPC900, V500R002C00SPCb00, V600R006C00, TE40 V500R002C00SPC600, V500R002C00SPC700, V500R002C00SPC900, V500R002C00SPCb00, V600R006C00, TE50 V500R002C00SPC600, V500R002C00SPC700, V500R002C00SPCb00, V600R006C00, TE60 V100R001C10, V500R002C00, V600R006C00 have a memory leak vulnerability due to memory don't be released when the XML parser process some node fail. An attacker could exploit it to cause memory leak, which may further lead to system exceptions.
### Affected Products
**Huawei Technologies Co., Ltd. - DP300,RP200,TE30,TE40,TE50,TE60**
Affected versions:
- DP300 V500R002C00, RP200 V500R002C00SPC200, V600R006C00, TE30 V100R001C10SPC300, V100R001C10SPC500, V100R001C10SPC600, V100R001C10SPC700, V500R002C00SPC200, V500R002C00SPC500, V500R002C00SPC600, V500R002C00SPC700, V500R002C00SPC900, V500R002C00SPCb00, V600R006C00, TE40 V500R002C00SPC600, V500R002C00SPC700, V500R002C00SPC900, V500R002C00SPCb00, V600R006C00, TE50 V500R002C00SPC600, V500R002C00SPC700, V500R002C00SPCb00, V600R006C00, TE60 V100R001C10, V500R002C00, V600R006C00 (Status: affected)
### References
1. [](http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-xml-en)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-6703, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-6703 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-6703
- **State**: PUBLISHED
- **Published Date**: December 14, 2023 at 21:48 UTC
- **Last Updated**: February 13, 2025 at 17:26 UTC
- **Reserved Date**: December 11, 2023 at 23:27 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use after free in Blink in Google Chrome prior to 120.0.6099.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
### Affected Products
**Google - Chrome**
Affected versions:
- 120.0.6099.109 (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_12.html)
2. [](https://crbug.com/1502102)
3. [](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI/)
4. [](https://security.gentoo.org/glsa/202401-34)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-25326, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-25326 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-25326
- **State**: PUBLISHED
- **Published Date**: February 27, 2025 at 00:00 UTC
- **Last Updated**: February 28, 2025 at 15:37 UTC
- **Reserved Date**: February 07, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in Merchants Union Consumer Finance Company Limited Merchants Union Finance iOS 6.19.0 allows attackers to access sensitive user information via supplying a crafted link.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ZhouZiyi1/Vuls/blob/main/250115-MerchantsUnionFinance/250115-MerchantsUnionFinance.pdf)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-23492, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-23492 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-23492
- **State**: PUBLISHED
- **Published Date**: December 08, 2022 at 00:08 UTC
- **Last Updated**: April 23, 2025 at 16:31 UTC
- **Reserved Date**: January 19, 2022 at 21:23 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
go-libp2p is the offical libp2p implementation in the Go programming language. Version `0.18.0` and older of go-libp2p are vulnerable to targeted resource exhaustion attacks. These attacks target libp2p’s connection, stream, peer, and memory management. An attacker can cause the allocation of large amounts of memory, ultimately leading to the process getting killed by the host’s operating system. While a connection manager tasked with keeping the number of connections within manageable limits has been part of go-libp2p, this component was designed to handle the regular churn of peers, not a targeted resource exhaustion attack. Users are advised to upgrade their version of go-libp2p to version `0.18.1` or newer. Users unable to upgrade may consult the denial of service (dos) mitigation page for more information on how to incorporate mitigation strategies, monitor your application, and respond to attacks.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**libp2p - go-libp2p**
Affected versions:
- < 0.18.0 (Status: affected)
### References
1. [https://github.com/libp2p/go-libp2p/security/advisories/GHSA-j7qp-mfxf-8xjw](https://github.com/libp2p/go-libp2p/security/advisories/GHSA-j7qp-mfxf-8xjw)
2. [https://github.com/libp2p/go-libp2p/commit/15d7dfbf54264ead8e6f49ca658d79c90635e2de](https://github.com/libp2p/go-libp2p/commit/15d7dfbf54264ead8e6f49ca658d79c90635e2de)
3. [https://docs.libp2p.io/reference/dos-mitigation/](https://docs.libp2p.io/reference/dos-mitigation/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-2621, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-2621 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-2621
- **State**: PUBLISHED
- **Published Date**: July 16, 2014 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 10:21 UTC
- **Reserved Date**: March 24, 2014 at 00:00 UTC
- **Assigned By**: hp
### Vulnerability Description
Unspecified vulnerability in HP Intelligent Management Center (iMC) before 7.0 E02020P03 and Branch Intelligent Management System (BIMS) before 7.0 E0201P02 allows remote attackers to obtain sensitive information via unknown vectors, aka ZDI-CAN-2090.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [hp-imc-cve20142621-info-disc(94491)](https://exchange.xforce.ibmcloud.com/vulnerabilities/94491)
2. [SSRT101410](https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04369484)
3. [HPSBHF02913](https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04369484)
4. [68546](http://www.securityfocus.com/bid/68546)
5. [1030568](http://www.securitytracker.com/id/1030568)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-17329, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-17329 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-17329
- **State**: PUBLISHED
- **Published Date**: March 09, 2018 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 20:51 UTC
- **Reserved Date**: December 04, 2017 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
Huawei ViewPoint 8660 V100R008C03 have a memory leak vulnerability. The software does not release allocated memory properly when parse XML Schema data. An authenticated attacker could upload a crafted XML file, successful exploit could cause the system service abnormal since run out of memory.
### Affected Products
**Huawei Technologies Co., Ltd. - ViewPoint 8660**
Affected versions:
- V100R008C03 (Status: affected)
### References
1. [](http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171206-03-xml-en)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-3663, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-3663 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-3663
- **State**: PUBLISHED
- **Published Date**: October 26, 2022 at 00:00 UTC
- **Last Updated**: April 14, 2025 at 15:57 UTC
- **Reserved Date**: October 22, 2022 at 00:00 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Axiomatic Bento4. It has been rated as problematic. This issue affects the function AP4_StsdAtom of the file Ap4StsdAtom.cpp of the component MP4fragment. The manipulation leads to null pointer dereference. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-212003.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-404: Security Weakness
### Affected Products
**Axiomatic - Bento4**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/axiomatic-systems/Bento4/issues/800)
2. [](https://github.com/axiomatic-systems/Bento4/files/9817303/mp4fragment_npd_Ap4StsdAtom.cpp75.zip)
3. [](https://vuldb.com/?id.212003)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-44956, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-44956 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-44956
- **State**: PUBLISHED
- **Published Date**: December 02, 2022 at 00:00 UTC
- **Last Updated**: April 24, 2025 at 20:18 UTC
- **Reserved Date**: November 07, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
webtareas 2.4p5 was discovered to contain a cross-site scripting (XSS) vulnerability in the component /projects/listprojects.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://webtareas.com)
2. [](https://github.com/anhdq201/webtareas/issues/3)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-8279, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-8279 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-8279
- **State**: PUBLISHED
- **Published Date**: November 16, 2017 at 22:00 UTC
- **Last Updated**: September 17, 2024 at 03:12 UTC
- **Reserved Date**: April 25, 2017 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
In android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, missing race condition protection while updating msg mask table can lead to buffer over-read. Also access to freed memory can happen while updating msg_mask information.
### Affected Products
**Qualcomm, Inc. - Android for MSM, Firefox OS for MSM, QRD Android**
Affected versions:
- All Android releases from CAF using the Linux kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2017-11-01)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-41166, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-41166 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-41166
- **State**: PUBLISHED
- **Published Date**: February 12, 2025 at 21:20 UTC
- **Last Updated**: February 13, 2025 at 19:46 UTC
- **Reserved Date**: July 17, 2024 at 03:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Stack-based buffer overflow in some Intel(R) PROSet/Wireless WiFi and Killerâ„¢ WiFi software for Windows before version 23.80 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**n/a - Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software for Windows**
Affected versions:
- before version 23.80 (Status: affected)
### References
1. [https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01224.html](https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01224.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2006-3085, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2006-3085 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3085
- **State**: PUBLISHED
- **Published Date**: June 23, 2006 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 18:16 UTC
- **Reserved Date**: June 19, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
xt_sctp in netfilter for Linux kernel before 2.6.17.1 allows attackers to cause a denial of service (infinite loop) via an SCTP chunk with a 0 length.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20703](http://secunia.com/advisories/20703)
2. [26680](http://www.osvdb.org/26680)
3. [ADV-2006-2451](http://www.vupen.com/english/advisories/2006/2451)
4. [SUSE-SA:2006:042](http://www.novell.com/linux/security/advisories/2006_42_kernel.html)
5. [](http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.17.1)
6. [linux-xt-sctp-dos(27384)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27384)
7. [20060623 rPSA-2006-0110-1 kernel](http://www.securityfocus.com/archive/1/438168/100/0/threaded)
8. [SUSE-SA:2006:047](http://www.novell.com/linux/security/advisories/2006_47_kernel.html)
9. [MDKSA-2006:123](http://www.mandriva.com/security/advisories?name=MDKSA-2006:123)
10. [2006-0037](http://www.trustix.org/errata/2006/0037)
11. [1016347](http://securitytracker.com/id?1016347)
12. [20831](http://secunia.com/advisories/20831)
13. [21498](http://secunia.com/advisories/21498)
14. [21045](http://secunia.com/advisories/21045)
15. [18550](http://www.securityfocus.com/bid/18550)
16. [21179](http://secunia.com/advisories/21179)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-53272, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-53272 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-53272
- **State**: PUBLISHED
- **Published Date**: December 11, 2024 at 22:06 UTC
- **Last Updated**: December 12, 2024 at 16:00 UTC
- **Reserved Date**: November 19, 2024 at 20:08 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Habitica is an open-source habit-building program. Versions prior to 5.28.5 are vulnerable to reflected cross-site scripting. The `login` and `social media` function in `RegisterLoginReset.vue` contains two reflected XSS vulnerabilities due to an incorrect sanitization function. An attacker can specify a malicious `redirectTo` parameter to trigger the vulnerability, giving the attacker control of the victim’s account when a victim registers or logins with a specially crafted link. Version 5.28.5 contains a patch.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**HabitRPG - habatica**
Affected versions:
- < 5.28.5 (Status: affected)
### References
1. [https://securitylab.github.com/advisories/GHSL-2024-109_GHSL-2024-111_habitica/](https://securitylab.github.com/advisories/GHSL-2024-109_GHSL-2024-111_habitica/)
2. [https://github.com/HabitRPG/habitica/commit/946ade5da1f52a804ef2ba76d49416c43e8166bf](https://github.com/HabitRPG/habitica/commit/946ade5da1f52a804ef2ba76d49416c43e8166bf)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-26719, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-26719 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-26719
- **State**: PUBLISHED
- **Published Date**: February 09, 2021 at 13:43 UTC
- **Last Updated**: August 03, 2024 at 20:33 UTC
- **Reserved Date**: February 05, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A directory traversal issue was discovered in Gradle gradle-enterprise-test-distribution-agent before 1.3.2, test-distribution-gradle-plugin before 1.3.2, and gradle-enterprise-maven-extension before 1.8.2. A malicious actor (with certain credentials) can perform a registration step such that crafted TAR archives lead to extraction of files into arbitrary filesystem locations.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://security.gradle.com/advisory/CVE-2021-26719)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2013-3488, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2013-3488 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-3488
- **State**: PUBLISHED
- **Published Date**: January 31, 2020 at 17:46 UTC
- **Last Updated**: August 06, 2024 at 16:14 UTC
- **Reserved Date**: May 07, 2013 at 00:00 UTC
- **Assigned By**: flexera
### Vulnerability Description
Stack-based buffer overflow in Media Player Classic - Home Cinema (MPC-HC) before 1.7.0.7858 allows remote attackers to execute arbitrary code via a crafted MPEG-2 Transport Stream (M2TS) file.
### Affected Products
**Media Player Classic - Media Player Classic - Home Cinema (MPC-HC)**
Affected versions:
- before 1.7.0 (Status: affected)
### References
1. [](http://mpc-hc.org/2013/09/29/1.7.0-released)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/87695)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-32802, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-32802 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-32802
- **State**: PUBLISHED
- **Published Date**: August 30, 2023 at 11:29 UTC
- **Last Updated**: September 24, 2024 at 19:24 UTC
- **Reserved Date**: May 15, 2023 at 12:15 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in WooCommerce WooCommerce Pre-Orders plugin <= 1.9.0 versions.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**WooCommerce - WooCommerce Pre-Orders**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/woocommerce-pre-orders/wordpress-woocommerce-pre-orders-plugin-1-9-0-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Rafie Muhammad (Patchstack)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-11552, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-11552 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-11552
- **State**: PUBLISHED
- **Published Date**: July 19, 2019 at 13:51 UTC
- **Last Updated**: August 04, 2024 at 22:55 UTC
- **Reserved Date**: April 25, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Code42 Enterprise and Crashplan for Small Business Client version 6.7 before 6.7.5, 6.8 before 6.8.8, and 6.9 before 6.9.4 allows eval injection. A proxy auto-configuration file, crafted by a lesser privileged user, may be used to execute arbitrary code at a higher privilege as the service user.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bordplate.no/blog/en/post/crashplan-privilege-escalation/)
2. [](https://code42.com/r/support/CVE-2019-11552)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-0999, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-0999 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-0999
- **State**: REJECTED
- **Last Updated**: February 22, 2023 at 00:00 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-39815, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-39815 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-39815
- **State**: PUBLISHED
- **Published Date**: August 24, 2022 at 13:42 UTC
- **Last Updated**: August 04, 2024 at 02:20 UTC
- **Reserved Date**: August 23, 2021 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
The PowerVR GPU driver allows unprivileged apps to allocated pinned memory, unpin it (which makes it available to be freed), and continue using the page in GPU calls. No privileges required and this results in kernel memory corruption.Product: AndroidVersions: Android SoCAndroid ID: A-232440670
### Affected Products
**n/a - Android**
Affected versions:
- Android SoC (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2022-08-01)
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.