System
stringclasses 1
value | User
stringlengths 139
142
| Assistant
stringlengths 279
328k
|
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-35762, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-35762 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-35762
- **State**: PUBLISHED
- **Published Date**: June 16, 2021 at 15:52 UTC
- **Last Updated**: August 04, 2024 at 17:09 UTC
- **Reserved Date**: December 28, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
bloofoxCMS 0.5.2.1 is infected with Path traversal in the 'fileurl' parameter that allows attackers to read local files.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/alexlang24/bloofoxCMS/issues/11)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-44580, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-44580 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-44580
- **State**: PUBLISHED
- **Published Date**: March 15, 2023 at 14:37 UTC
- **Last Updated**: January 13, 2025 at 15:51 UTC
- **Reserved Date**: November 01, 2022 at 17:34 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
SQL Injection (SQLi) vulnerability in RichPlugins Plugin for Google Reviews plugin <= 2.2.3 versions.
### CVSS Metrics
- **CVSS Base Score**: 9.1/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**RichPlugins - Plugin for Google Reviews**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/widget-google-reviews/wordpress-plugin-for-google-reviews-plugin-2-2-3-auth-sql-injection-sqli-vulnerability?_s_id=cve)
### Credits
- Rafie Muhammad (Patchstack)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-25038, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-25038 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25038
- **State**: PUBLISHED
- **Published Date**: May 26, 2023 at 12:00 UTC
- **Last Updated**: November 12, 2024 at 14:11 UTC
- **Reserved Date**: February 02, 2023 at 09:58 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in 984.Ru For the visually impaired plugin <= 0.58 versions.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**984.ru - For the visually impaired**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/for-the-visually-impaired/wordpress-for-the-visually-impaired-plugin-0-58-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Rio Darmawan (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2011-4686, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2011-4686 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-4686
- **State**: PUBLISHED
- **Published Date**: December 07, 2011 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 19:19 UTC
- **Reserved Date**: December 06, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in the Web Workers implementation in Opera before 11.60 allows remote attackers to cause a denial of service (application crash) via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.opera.com/docs/changelogs/mac/1160/)
2. [](http://www.opera.com/docs/changelogs/windows/1160/)
3. [](http://www.opera.com/docs/changelogs/unix/1160/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-8837, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-8837 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-8837
- **State**: REJECTED
- **Published Date**: January 03, 2017 at 20:00 UTC
- **Last Updated**: January 03, 2017 at 19:57 UTC
- **Reserved Date**: October 18, 2016 at 00:00 UTC
- **Assigned By**: nvidia
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-9875, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-9875 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-9875
- **State**: PUBLISHED
- **Published Date**: October 22, 2020 at 17:58 UTC
- **Last Updated**: August 04, 2024 at 10:43 UTC
- **Reserved Date**: March 02, 2020 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An integer overflow was addressed through improved input validation. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing a maliciously crafted image may lead to arbitrary code execution.
### Affected Products
**Apple - iOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
**Apple - iTunes for Windows**
Affected versions:
- unspecified (Status: affected)
**Apple - iCloud for Windows**
Affected versions:
- unspecified (Status: affected)
**Apple - iCloud for Windows (Legacy)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/kb/HT211289)
2. [](https://support.apple.com/kb/HT211288)
3. [](https://support.apple.com/kb/HT211290)
4. [](https://support.apple.com/kb/HT211291)
5. [](https://support.apple.com/kb/HT211293)
6. [](https://support.apple.com/kb/HT211294)
7. [](https://support.apple.com/kb/HT211295)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2005-4413, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2005-4413 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-4413
- **State**: PUBLISHED
- **Published Date**: December 20, 2005 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 23:46 UTC
- **Reserved Date**: December 20, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in sample scripts in IBM WebSphere Application Server 6 allow remote attackers to inject arbitrary web script or HTML via the (1) E-mail address field to (a) PlantsByWebSphere/login.jsp, (2) message field to (b) TechnologySample/BulletinBoard Script, (3) Email address field to (c) TechnologySamples/Subscription, and the (4) Movie Name, (5) Movie Reviewer, and (6) Movie Review fields to (d) TechnologySamples/MovieReview2_1.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.ipomonis.com/advisories/ibm_css.txt)
2. [1015360](http://securitytracker.com/id?1015360)
3. [15929](http://www.securityfocus.com/bid/15929)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-26074, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-26074 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-26074
- **State**: PUBLISHED
- **Published Date**: June 13, 2024 at 07:53 UTC
- **Last Updated**: October 07, 2024 at 13:27 UTC
- **Reserved Date**: February 14, 2024 at 17:37 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Adobe - Adobe Experience Manager**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2004-1573, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2004-1573 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-1573
- **State**: PUBLISHED
- **Published Date**: February 20, 2005 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 00:53 UTC
- **Reserved Date**: February 20, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The documentation for AJ-Fork 167 implies that users should set permissions for users.db.php to 777, which allows local users to execute arbitrary PHP code and gain privileges as the administrator.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [11301](http://www.securityfocus.com/bid/11301)
2. [1011484](http://securitytracker.com/id?1011484)
3. [](http://echo.or.id/adv/adv07-y3dips-2004.txt)
4. [20041001 Multiple Vulnerabilities in AJ-Fork](http://marc.info/?l=bugtraq&m=109664986210763&w=2)
5. [aj-fork-usersdbphp-write-access(17571)](https://exchange.xforce.ibmcloud.com/vulnerabilities/17571)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-19264, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-19264 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-19264
- **State**: PUBLISHED
- **Published Date**: December 17, 2019 at 13:59 UTC
- **Last Updated**: August 05, 2024 at 02:09 UTC
- **Reserved Date**: November 25, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Simplifile RecordFusion through 2019-11-25, the logs and hist parameters allow remote attackers to access local files via a logger/logs?/../ or logger/hist?/../ URI.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.securenetworkinc.com/news/2019/11/26/recordfusion-local-file-inclusion-vulnerability-cve-2019-19264)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-41278, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-41278 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-41278
- **State**: PUBLISHED
- **Published Date**: December 13, 2022 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 12:42 UTC
- **Reserved Date**: September 21, 2022 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in JT2Go (All versions < V14.1.0.6), Teamcenter Visualization V13.2 (All versions < V13.2.0.12), Teamcenter Visualization V13.3 (All versions < V13.3.0.8), Teamcenter Visualization V14.0 (All versions < V14.0.0.4), Teamcenter Visualization V14.1 (All versions < V14.1.0.6). The CGM_NIST_Loader.dll contains a null pointer dereference vulnerability while parsing specially crafted CGM files. An attacker could leverage this vulnerability to crash the application causing denial of service condition.
### CVSS Metrics
- **CVSS Base Score**: 3.3/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-476: NULL Pointer Dereference
### Affected Products
**Siemens - JT2Go**
Affected versions:
- All versions < V14.1.0.6 (Status: affected)
**Siemens - Teamcenter Visualization V13.2**
Affected versions:
- All versions < V13.2.0.12 (Status: affected)
**Siemens - Teamcenter Visualization V13.3**
Affected versions:
- All versions < V13.3.0.8 (Status: affected)
**Siemens - Teamcenter Visualization V14.0**
Affected versions:
- All versions < V14.0.0.4 (Status: affected)
**Siemens - Teamcenter Visualization V14.1**
Affected versions:
- All versions < V14.1.0.6 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-700053.pdf)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-12807, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-12807 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-12807
- **State**: REJECTED
- **Published Date**: August 14, 2017 at 13:00 UTC
- **Last Updated**: August 14, 2017 at 12:57 UTC
- **Reserved Date**: August 11, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-30031, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-30031 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-30031
- **State**: REJECTED
- **Published Date**: April 21, 2021 at 15:31 UTC
- **Last Updated**: April 21, 2021 at 16:28 UTC
- **Reserved Date**: April 02, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-8767, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-8767 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-8767
- **State**: PUBLISHED
- **Published Date**: November 12, 2020 at 18:10 UTC
- **Last Updated**: August 04, 2024 at 10:12 UTC
- **Reserved Date**: February 06, 2020 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Uncaught exception in the Intel(R) 50GbE IP Core for Intel(R) Quartus Prime before version 20.2 may allow an authenticated user to potentially enable denial of service via local access.
### Affected Products
**n/a - Intel(R) 50GbE IP Core for Intel(R) Quartus Prime**
Affected versions:
- before version 20.2 (Status: affected)
### References
1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00400)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-10891, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-10891 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-10891
- **State**: PUBLISHED
- **Published Date**: August 21, 2019 at 18:20 UTC
- **Last Updated**: August 06, 2024 at 03:38 UTC
- **Reserved Date**: August 15, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The aryo-activity-log plugin before 2.3.3 for WordPress has XSS.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wordpress.org/plugins/aryo-activity-log/#developers)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-9725, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-9725 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-9725
- **State**: PUBLISHED
- **Published Date**: March 07, 2017 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 02:59 UTC
- **Reserved Date**: December 01, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM QRadar Incident Forensics 7.2 allows for Cross-Origin Resource Sharing (CORS), which is a mechanism that allows web sites to request resources from external sites, avoiding the need to duplicate them. IBM Reference #: 1999539.
### Affected Products
**IBM Corporation - QRadar SIEM**
Affected versions:
- 7.1 MR1 (Status: affected)
- 7.1 (Status: affected)
- 7.0 (Status: affected)
- 7.2 (Status: affected)
- 7.1 MR2 (Status: affected)
- 7 (Status: affected)
- 7.2.3 (Status: affected)
### References
1. [](http://www.ibm.com/support/docview.wss?uid=swg21999539)
2. [96530](http://www.securityfocus.com/bid/96530)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-6485, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-6485 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6485
- **State**: PUBLISHED
- **Published Date**: March 12, 2016 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 07:22 UTC
- **Reserved Date**: August 17, 2015 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Schneider Electric Telvent Sage 2300 RTUs with firmware before C3413-500-S01, and LANDAC II-2, Sage 1410, Sage 1430, Sage 1450, Sage 2400, and Sage 3030M RTUs with firmware before C3414-500-S02J2, allow remote attackers to obtain sensitive information from device memory by reading a padding field of an Ethernet packet.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://ics-cert.us-cert.gov/advisories/ICSA-16-070-01)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-22756, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-22756 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-22756
- **State**: PUBLISHED
- **Published Date**: December 22, 2022 at 00:00 UTC
- **Last Updated**: April 16, 2025 at 14:39 UTC
- **Reserved Date**: January 07, 2022 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
If a user was convinced to drag and drop an image to their desktop or other folder, the resulting object could have been changed into an executable script which would have run arbitrary code after the user clicked on it. This vulnerability affects Firefox < 97, Thunderbird < 91.6, and Firefox ESR < 91.6.
### Affected Products
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Thunderbird**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox ESR**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.mozilla.org/security/advisories/mfsa2022-05/)
2. [](https://www.mozilla.org/security/advisories/mfsa2022-04/)
3. [](https://www.mozilla.org/security/advisories/mfsa2022-06/)
4. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1317873)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-13715, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-13715 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-13715
- **State**: PUBLISHED
- **Published Date**: August 28, 2017 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 19:05 UTC
- **Reserved Date**: August 28, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The __skb_flow_dissect function in net/core/flow_dissector.c in the Linux kernel before 4.3 does not ensure that n_proto, ip_proto, and thoff are initialized, which allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a single crafted MPLS packet.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [100517](http://www.securityfocus.com/bid/100517)
2. [](http://seclists.org/oss-sec/2017/q3/345)
3. [](https://github.com/torvalds/linux/commit/a6e544b0a88b53114bfa5a57e21b7be7a8dfc9d0)
4. [](http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a6e544b0a88b53114bfa5a57e21b7be7a8dfc9d0)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-4220, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-4220 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-4220
- **State**: PUBLISHED
- **Published Date**: July 17, 2014 at 02:36 UTC
- **Last Updated**: August 06, 2024 at 11:12 UTC
- **Reserved Date**: June 17, 2014 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in Oracle Java SE 7u60 and 8u5 allows remote attackers to affect integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2014-4208.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.vmware.com/security/advisories/VMSA-2014-0012.html)
2. [HPSBUX03091](http://marc.info/?l=bugtraq&m=140852886808946&w=2)
3. [1030577](http://www.securitytracker.com/id/1030577)
4. [59987](http://secunia.com/advisories/59987)
5. [SSRT101667](http://marc.info/?l=bugtraq&m=140852886808946&w=2)
6. [oracle-cpujul2014-cve20144220(94598)](https://exchange.xforce.ibmcloud.com/vulnerabilities/94598)
7. [20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities](http://www.securityfocus.com/archive/1/534161/100/0/threaded)
8. [68576](http://www.securityfocus.com/bid/68576)
9. [60817](http://secunia.com/advisories/60817)
10. [59924](http://secunia.com/advisories/59924)
11. [61577](http://secunia.com/advisories/61577)
12. [](http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html)
13. [59680](http://secunia.com/advisories/59680)
14. [](http://www-01.ibm.com/support/docview.wss?uid=swg21686383)
15. [20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities](http://seclists.org/fulldisclosure/2014/Dec/23)
16. [](http://www-01.ibm.com/support/docview.wss?uid=swg21680334)
17. [60622](http://secunia.com/advisories/60622)
18. [60081](http://secunia.com/advisories/60081)
19. [RHSA-2014:0902](https://access.redhat.com/errata/RHSA-2014:0902)
20. [61640](http://secunia.com/advisories/61640)
21. [](http://www-01.ibm.com/support/docview.wss?uid=swg21686824)
22. [GLSA-201502-12](http://security.gentoo.org/glsa/glsa-201502-12.xml)
23. [60317](http://secunia.com/advisories/60317)
24. [SUSE-SU-2015:0344](http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-11728, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-11728 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-11728
- **State**: PUBLISHED
- **Published Date**: July 29, 2017 at 05:00 UTC
- **Last Updated**: August 05, 2024 at 18:19 UTC
- **Reserved Date**: July 29, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A heap-based buffer over-read was found in the function OpCode (called from decompileSETMEMBER) in util/decompile.c in Ming 0.4.8, which allows attackers to cause a denial of service via a crafted file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/libming/libming/issues/82)
2. [](http://somevulnsofadlab.blogspot.jp/2017/07/libmingheap-buffer-overflow-in-opcode_32.html)
3. [GLSA-201904-24](https://security.gentoo.org/glsa/201904-24)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-0302, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-0302 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-0302
- **State**: PUBLISHED
- **Published Date**: January 15, 2023 at 00:00 UTC
- **Last Updated**: April 07, 2025 at 17:47 UTC
- **Reserved Date**: January 15, 2023 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) in GitHub repository radareorg/radare2 prior to 5.8.2.
### Weakness Classification (CWE)
- CWE-75: Security Weakness
### Affected Products
**radareorg - radareorg/radare2**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/583133af-7ae6-4a21-beef-a4b0182cf82e)
2. [](https://github.com/radareorg/radare2/commit/961f0e723903011d4f54c2396e44efa91fcc74ce)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-23727, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-23727 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-23727
- **State**: PUBLISHED
- **Published Date**: January 23, 2025 at 15:29 UTC
- **Last Updated**: February 12, 2025 at 20:41 UTC
- **Reserved Date**: January 16, 2025 at 11:28 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound AZ Content Finder allows Reflected XSS. This issue affects AZ Content Finder: from n/a through 0.1.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**NotFound - AZ Content Finder**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/az-content-finder/vulnerability/wordpress-az-content-finder-plugin-0-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- João Pedro S Alcântara (Kinorth) (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-1340, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-1340 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-1340
- **State**: PUBLISHED
- **Published Date**: April 22, 2019 at 15:35 UTC
- **Last Updated**: September 17, 2024 at 01:10 UTC
- **Reserved Date**: January 22, 2015 at 00:00 UTC
- **Assigned By**: canonical
### Vulnerability Description
LXD before version 0.19-0ubuntu5 doUidshiftIntoContainer() has an unsafe Chmod() call that races against the stat in the Filepath.Walk() function. A symbolic link created in that window could cause any file on the system to have any mode of the attacker's choice.
### Affected Products
**Ubuntu - LXD**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://github.com/lxc/lxd/commit/19c6961cc1012c8a529f20807328a9357f5034f4)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2010-3671, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2010-3671 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-3671
- **State**: PUBLISHED
- **Published Date**: November 05, 2019 at 19:19 UTC
- **Last Updated**: August 07, 2024 at 03:18 UTC
- **Reserved Date**: September 28, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TYPO3 before 4.1.14, 4.2.x before 4.2.13, 4.3.x before 4.3.4 and 4.4.x before 4.4.1 is open to a session fixation attack which allows remote attackers to hijack a victim's session.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://security-tracker.debian.org/tracker/CVE-2010-3671)
2. [](https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590719)
3. [](https://typo3.org/security/advisory/typo3-sa-2010-012/#Broken_Authentication_and_Session_Management)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-29640, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-29640 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-29640
- **State**: REJECTED
- **Last Updated**: February 15, 2024 at 05:31 UTC
- **Reserved Date**: March 30, 2021 at 17:16 UTC
- **Assigned By**: freebsd
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-22657, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-22657 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-22657
- **State**: PUBLISHED
- **Published Date**: February 01, 2023 at 17:56 UTC
- **Last Updated**: March 26, 2025 at 17:49 UTC
- **Reserved Date**: January 13, 2023 at 06:43 UTC
- **Assigned By**: f5
### Vulnerability Description
On F5OS-A beginning in version 1.2.0 to before 1.3.0 and F5OS-C beginning in version 1.3.0 to before 1.5.0, processing F5OS tenant file names may allow for command injection. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
### CVSS Metrics
- **CVSS Base Score**: 7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-77: Security Weakness
### Affected Products
**F5 - F5OS-A**
Affected versions:
- 1.2.0 (Status: affected)
**F5 - F5OS-C**
Affected versions:
- 1.3.0 (Status: affected)
### References
1. [](https://my.f5.com/manage/s/article/K06345931)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-47466, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-47466 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-47466
- **State**: PUBLISHED
- **Published Date**: May 07, 2025 at 14:19 UTC
- **Last Updated**: May 07, 2025 at 18:21 UTC
- **Reserved Date**: May 07, 2025 at 09:38 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Rustaurius Ultimate WP Mail allows Cross Site Request Forgery. This issue affects Ultimate WP Mail: from n/a through 1.3.4.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Rustaurius - Ultimate WP Mail**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/ultimate-wp-mail/vulnerability/wordpress-ultimate-wp-mail-1-3-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- domiee13 (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-34971, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-34971 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-34971
- **State**: PUBLISHED
- **Published Date**: May 07, 2024 at 22:54 UTC
- **Last Updated**: August 04, 2024 at 00:26 UTC
- **Reserved Date**: June 17, 2021 at 19:27 UTC
- **Assigned By**: zdi
### Vulnerability Description
Foxit PDF Reader JPG2000 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of PDF files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14812.
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**Foxit - PDF Reader**
Affected versions:
- 11.0.1.49938 (Status: affected)
### References
1. [ZDI-21-1202](https://www.zerodayinitiative.com/advisories/ZDI-21-1202/)
2. [vendor-provided URL](https://www.foxit.com/support/security-bulletins.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-23626, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-23626 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-23626
- **State**: PUBLISHED
- **Published Date**: January 25, 2024 at 23:41 UTC
- **Last Updated**: August 29, 2024 at 18:50 UTC
- **Reserved Date**: January 18, 2024 at 21:37 UTC
- **Assigned By**: XI
### Vulnerability Description
A command injection vulnerability exists in the ‘SaveSysLogParams’
parameter of the Motorola MR2600. A remote attacker can exploit this
vulnerability to achieve command execution. Authentication is required,
however can be bypassed.
### CVSS Metrics
- **CVSS Base Score**: 9/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-77: Security Weakness
### Affected Products
**Motorola - MR2600**
Affected versions:
- 1.0.7 (Status: affected)
### References
1. [](https://blog.exodusintel.com/2024/01/25/motorola-mr2600-savesyslogparams-command-injection-vulnerability/)
### Credits
- Exodus Intelligence
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-25192, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-25192 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25192
- **State**: PUBLISHED
- **Published Date**: February 15, 2023 at 00:00 UTC
- **Last Updated**: March 19, 2025 at 15:38 UTC
- **Reserved Date**: February 04, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
AMI MegaRAC SPX devices allow User Enumeration through Redfish. The fixed versions are SPx12-update-7.00 and SPx13-update-5.00.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023002.pdf)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2005-1241, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2005-1241 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-1241
- **State**: PUBLISHED
- **Published Date**: April 24, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 21:44 UTC
- **Reserved Date**: April 24, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in the third party tool from Powertech, as used to secure the iSeries AS/400 FTP server, allows remote attackers to access arbitrary files, including those from qsys.lib, via ".." sequences in a GET request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20050420 Canonicalization and directory traversal in iSeries FTP security products](http://www.securityfocus.com/archive/1/396628)
2. [13312](http://www.securityfocus.com/bid/13312)
3. [](http://www.venera.com/downloads/Canonicalization_problems_in_iSeries_FTP_security.pdf)
4. [multiple-vendor-security-bypass(20260)](https://exchange.xforce.ibmcloud.com/vulnerabilities/20260)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-21978, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-21978 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21978
- **State**: PUBLISHED
- **Published Date**: April 18, 2023 at 19:54 UTC
- **Last Updated**: September 16, 2024 at 15:05 UTC
- **Reserved Date**: December 17, 2022 at 19:26 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Application Object Library product of Oracle E-Business Suite (component: GUI). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Application Object Library. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Application Object Library, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Application Object Library accessible data as well as unauthorized read access to a subset of Oracle Application Object Library accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Application Object Library. CVSS 3.1 Base Score 6.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L).
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Affected Products
**Oracle Corporation - Application Object Library**
Affected versions:
- 12.2.3-12.2.11 (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpuapr2023.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-9017, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-9017 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9017
- **State**: REJECTED
- **Published Date**: August 17, 2020 at 14:10 UTC
- **Last Updated**: August 17, 2020 at 14:10 UTC
- **Reserved Date**: May 15, 2017 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-2295, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-2295 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2295
- **State**: PUBLISHED
- **Published Date**: May 17, 2023 at 00:00 UTC
- **Last Updated**: January 22, 2025 at 18:25 UTC
- **Reserved Date**: April 26, 2023 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A vulnerability was found in the libreswan library. This security issue occurs when an IKEv1 Aggressive Mode packet is received with only unacceptable crypto algorithms, and the response packet is not sent with a zero responder SPI. When a subsequent packet is received where the sender reuses the libreswan responder SPI as its own initiator SPI, the pluto daemon state machine crashes. No remote code execution is possible. This CVE exists because of a CVE-2023-30570 security regression for libreswan package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**n/a - libreswan**
Affected versions:
- Affects libreswan v4.9-1.el8 and libreswan v4.9-1.el9, Fixed in libreswan v4.9-3.el8_8 and libreswan v4.9-4.el9_2 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=2189777)
2. [](https://access.redhat.com/security/cve/CVE-2023-2295)
3. [](https://access.redhat.com/errata/RHSA-2023:3107)
4. [](https://access.redhat.com/errata/RHSA-2023:3148)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-27104, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-27104 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-27104
- **State**: PUBLISHED
- **Published Date**: April 19, 2022 at 16:59 UTC
- **Last Updated**: August 03, 2024 at 05:18 UTC
- **Reserved Date**: March 14, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An Unauthenticated time-based blind SQL injection vulnerability exists in Forma LMS prior to v.1.4.3.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.swascan.com/it/security-blog/)
2. [](https://www.formalms.org/download.html)
3. [](https://www.swascan.com/security-advisory-forma-lms/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-24148, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-24148 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-24148
- **State**: PUBLISHED
- **Published Date**: March 31, 2025 at 22:22 UTC
- **Last Updated**: April 02, 2025 at 15:20 UTC
- **Reserved Date**: January 17, 2025 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
This issue was addressed with improved handling of executable types. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious JAR file may bypass Gatekeeper checks.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/122373)
2. [](https://support.apple.com/en-us/122374)
3. [](https://support.apple.com/en-us/122375)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-16147, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-16147 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16147
- **State**: PUBLISHED
- **Published Date**: June 07, 2018 at 02:00 UTC
- **Last Updated**: September 16, 2024 at 17:03 UTC
- **Reserved Date**: October 29, 2017 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
shit-server is a file server. shit-server is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**HackerOne - shit-server node module**
Affected versions:
- All versions (Status: affected)
### References
1. [](https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/shit-server)
2. [](https://nodesecurity.io/advisories/430)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-13290, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-13290 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13290
- **State**: PUBLISHED
- **Published Date**: January 09, 2025 at 20:15 UTC
- **Last Updated**: January 14, 2025 at 15:24 UTC
- **Reserved Date**: January 09, 2025 at 18:28 UTC
- **Assigned By**: drupal
### Vulnerability Description
Incorrect Authorization vulnerability in Drupal OhDear Integration allows Forceful Browsing.This issue affects OhDear Integration: from 0.0.0 before 2.0.4.
### Weakness Classification (CWE)
- CWE-863: Incorrect Authorization
### Affected Products
**Drupal - OhDear Integration**
Affected versions:
- 0.0.0 (Status: affected)
### References
1. [](https://www.drupal.org/sa-contrib-2024-056)
### Credits
- casey
- casey
- Lio Novelli
- Greg Knaddison
- Juraj Nemec
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-43344, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-43344 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-43344
- **State**: PUBLISHED
- **Published Date**: October 19, 2023 at 00:00 UTC
- **Last Updated**: September 12, 2024 at 19:59 UTC
- **Reserved Date**: September 18, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in opensolution Quick CMS v.6.7 allows a local attacker to execute arbitrary code via a crafted script to the SEO - Meta description parameter in the Pages Menu component.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/sromanhu/CVE-2023-43344-Quick-CMS-Stored-XSS---SEO-Meta-description)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-0430, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-0430 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-0430
- **State**: PUBLISHED
- **Published Date**: March 15, 2022 at 14:20 UTC
- **Last Updated**: August 02, 2024 at 23:25 UTC
- **Reserved Date**: January 31, 2022 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository httpie/httpie prior to 3.1.0.
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**httpie - httpie/httpie**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://github.com/httpie/httpie/commit/65ab7d5caaaf2f95e61f9dd65441801c2ddee38b)
2. [](https://huntr.dev/bounties/dafb2e4f-c6b6-4768-8ef5-b396cd6a801f)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-4512, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-4512 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4512
- **State**: PUBLISHED
- **Published Date**: September 24, 2015 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 06:18 UTC
- **Reserved Date**: June 10, 2015 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
gfx/2d/DataSurfaceHelpers.cpp in Mozilla Firefox before 41.0 on Linux improperly attempts to use the Cairo library with 32-bit color-depth surface creation followed by 16-bit color-depth surface display, which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) by using a CANVAS element to trigger 2D rendering.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [openSUSE-SU-2015:1681](http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html)
2. [](http://www.mozilla.org/security/announce/2015/mfsa2015-107.html)
3. [USN-2743-4](http://www.ubuntu.com/usn/USN-2743-4)
4. [](http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html)
5. [USN-2743-3](http://www.ubuntu.com/usn/USN-2743-3)
6. [76815](http://www.securityfocus.com/bid/76815)
7. [USN-2743-2](http://www.ubuntu.com/usn/USN-2743-2)
8. [1033640](http://www.securitytracker.com/id/1033640)
9. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1170390)
10. [openSUSE-SU-2015:1658](http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html)
11. [USN-2743-1](http://www.ubuntu.com/usn/USN-2743-1)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-1999-0755, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-1999-0755 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-0755
- **State**: PUBLISHED
- **Published Date**: January 04, 2000 at 05:00 UTC
- **Last Updated**: August 01, 2024 at 16:48 UTC
- **Reserved Date**: November 25, 1999 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Windows NT RRAS and RAS clients cache a user's password even if the user has not selected the "Save password" option.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [Q230681](http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ230681)
2. [MS99-017](https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-017)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-28952, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-28952 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-28952
- **State**: PUBLISHED
- **Published Date**: March 20, 2021 at 20:05 UTC
- **Last Updated**: August 03, 2024 at 21:55 UTC
- **Reserved Date**: March 20, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the Linux kernel through 5.11.8. The sound/soc/qcom/sdm845.c soundwire device driver has a buffer overflow when an unexpected port ID number is encountered, aka CID-1c668e1c0a0f. (This has been fixed in 5.12-rc4.)
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://lore.kernel.org/alsa-devel/20210309142129.14182-2-srinivas.kandagatla%40linaro.org/)
2. [](https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1c668e1c0a0f74472469cd514f40c9012b324c31)
3. [FEDORA-2021-e636ce53df](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PTRNPQTZ4GVS46SZ4OBXY5YDOGVPSTGQ/)
4. [FEDORA-2021-68b0dd2373](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4VCKIOXCOZGXBEZMO5LGGV5MWCHO6FT3/)
5. [FEDORA-2021-9503fffad9](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T2S3I4SLRNRUQDOFYUS6IUAZMQNMPNLG/)
6. [](https://security.netapp.com/advisory/ntap-20210430-0003/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-5550, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-5550 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-5550
- **State**: PUBLISHED
- **Published Date**: November 09, 2023 at 19:38 UTC
- **Last Updated**: August 02, 2024 at 07:59 UTC
- **Reserved Date**: October 12, 2023 at 00:50 UTC
- **Assigned By**: fedora
### Vulnerability Description
In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user who also has direct access to the web server outside of the Moodle webroot could utilise a local file include to achieve remote code execution.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-94: Code Injection
### Affected Products
**Unknown - Unknown**
Affected versions:
- 4.2.0 (Status: affected)
- 4.1.0 (Status: affected)
- 4.0.0 (Status: affected)
- 3.11.0 (Status: affected)
- 0 (Status: affected)
### References
1. [](http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-72249)
2. [RHBZ#2243452](https://bugzilla.redhat.com/show_bug.cgi?id=2243452)
3. [](https://moodle.org/mod/forum/discuss.php?d=451591)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-1472, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-1472 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-1472
- **State**: PUBLISHED
- **Published Date**: January 16, 2014 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 09:42 UTC
- **Reserved Date**: January 15, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in the Enterprise Manager in McAfee Vulnerability Manager (MVM) 7.5.5 and earlier allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [56394](http://secunia.com/advisories/56394)
2. [64795](http://www.securityfocus.com/bid/64795)
3. [1029591](http://www.securitytracker.com/id/1029591)
4. [mcafee-vm-unspec-xss(90244)](https://exchange.xforce.ibmcloud.com/vulnerabilities/90244)
5. [101940](http://osvdb.org/101940)
6. [](https://kc.mcafee.com/corporate/index?page=content&id=SB10061)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-19365, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-19365 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-19365
- **State**: PUBLISHED
- **Published Date**: March 18, 2019 at 19:58 UTC
- **Last Updated**: August 05, 2024 at 11:37 UTC
- **Reserved Date**: November 19, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The REST API in Wowza Streaming Engine 4.7.4.01 allows traversal of the directory structure and retrieval of a file via a remote, specifically crafted HTTP request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://blog.gdssecurity.com/labs/2019/2/11/wowza-streaming-engine-manager-directory-traversal-and-local.html)
2. [](https://raw.githubusercontent.com/WowzaMediaSystems/public_cve/main/wowza-streaming-engine/CVE-2018-19365.txt)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2010-2963, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2010-2963 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-2963
- **State**: PUBLISHED
- **Published Date**: November 26, 2010 at 18:23 UTC
- **Last Updated**: August 07, 2024 at 02:55 UTC
- **Reserved Date**: August 04, 2010 at 00:00 UTC
- **Assigned By**: canonical
### Vulnerability Description
drivers/media/video/v4l2-compat-ioctl32.c in the Video4Linux (V4L) implementation in the Linux kernel before 2.6.36 on 64-bit platforms does not validate the destination of a memory copy operation, which allows local users to write to arbitrary kernel memory locations, and consequently gain privileges, via a VIDIOCSTUNER ioctl call on a /dev/video device, followed by a VIDIOCSMICROCODE ioctl call on this device.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-1000-1](http://www.ubuntu.com/usn/USN-1000-1)
2. [1024710](http://www.securitytracker.com/id?1024710)
3. [FEDORA-2010-18983](http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html)
4. [ADV-2010-3321](http://www.vupen.com/english/advisories/2010/3321)
5. [](http://www.outflux.net/blog/archives/2010/10/19/cve-2010-2963-v4l-compat-exploit/)
6. [MDVSA-2010:257](http://www.mandriva.com/security/advisories?name=MDVSA-2010:257)
7. [SUSE-SA:2010:057](http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00004.html)
8. [](http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3e645d6b485446c54c6745c5e2cf5c528fe4deec)
9. [44242](http://www.securityfocus.com/bid/44242)
10. [](https://bugzilla.redhat.com/show_bug.cgi?id=642465)
11. [](http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36)
12. [42745](http://secunia.com/advisories/42745)
13. [SUSE-SA:2010:053](http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00008.html)
14. [DSA-2126](http://www.debian.org/security/2010/dsa-2126)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-20909, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-20909 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-20909
- **State**: PUBLISHED
- **Published Date**: February 17, 2024 at 01:50 UTC
- **Last Updated**: March 13, 2025 at 17:01 UTC
- **Reserved Date**: December 07, 2023 at 22:28 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in Oracle Audit Vault and Database Firewall (component: Firewall). Supported versions that are affected are 20.1-20.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via Oracle Net to compromise Oracle Audit Vault and Database Firewall. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Audit Vault and Database Firewall accessible data. CVSS 3.1 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N`
### Affected Products
**Oracle Corporation - Audit Vault and Database Firewall**
Affected versions:
- 20.1 (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpujan2024.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-44481, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-44481 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-44481
- **State**: PUBLISHED
- **Published Date**: December 21, 2023 at 18:58 UTC
- **Last Updated**: September 12, 2024 at 19:52 UTC
- **Reserved Date**: September 29, 2023 at 14:42 UTC
- **Assigned By**: Fluid Attacks
### Vulnerability Description
Leave Management System Project v1.0 is vulnerable to multiple Authenticated SQL Injection vulnerabilities. The 'setearnleave' parameter of the admin/setleaves.php resource does not validate the characters received and they are sent unfiltered to the database.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Projectworlds Pvt. Limited - Leave Management System Project**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://projectworlds.in/)
2. [](https://fluidattacks.com/advisories/martin/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-42335, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-42335 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-42335
- **State**: PUBLISHED
- **Published Date**: August 20, 2024 at 12:18 UTC
- **Last Updated**: August 20, 2024 at 13:31 UTC
- **Reserved Date**: July 30, 2024 at 09:20 UTC
- **Assigned By**: INCD
### Vulnerability Description
7Twenty - CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**7Twenty - 7Twenty Bot**
Affected versions:
- All versions (Status: affected)
### References
1. [](https://www.gov.il/en/Departments/faq/cve_advisories)
### Credits
- Guy hayou
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-9808, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-9808 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9808
- **State**: PUBLISHED
- **Published Date**: April 26, 2019 at 16:10 UTC
- **Last Updated**: August 04, 2024 at 22:01 UTC
- **Reserved Date**: March 14, 2019 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
If WebRTC permission is requested from documents with data: or blob: URLs, the permission notifications do not properly display the originating domain. The notification states "Unknown origin" as the requestee, leading to user confusion about which site is asking for this permission. This vulnerability affects Firefox < 66.
### Affected Products
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.mozilla.org/security/advisories/mfsa2019-07/)
2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1434634)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-25139, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-25139 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-25139
- **State**: PUBLISHED
- **Published Date**: February 14, 2022 at 21:47 UTC
- **Last Updated**: August 03, 2024 at 04:29 UTC
- **Reserved Date**: February 14, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
njs through 0.7.0, used in NGINX, was discovered to contain a heap use-after-free in njs_await_fulfilled.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/nginx/njs/issues/451)
2. [](https://github.com/nginx/njs/commit/6a07c2156a07ef307b6dcf3c2ca8571a5f1af7a6)
3. [](https://security.netapp.com/advisory/ntap-20220303-0007/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-11682, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-11682 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-11682
- **State**: PUBLISHED
- **Published Date**: July 27, 2017 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 18:19 UTC
- **Reserved Date**: July 26, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stored Cross-site scripting vulnerability in Hashtopussy 0.4.0 allows remote attackers to inject arbitrary web script or HTML via the (1) version, (2) url, or (3) rootdir parameter in hashcat.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/s3inlc/hashtopussy/issues/241)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-9042, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-9042 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-9042
- **State**: PUBLISHED
- **Published Date**: February 04, 2015 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 13:33 UTC
- **Reserved Date**: November 21, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the import functionality in the bookmarks application in ownCloud before 5.0.18, 6.x before 6.0.6, and 7.x before 7.0.3 allows remote authenticated users to inject arbitrary web script or HTML by importing a link with an unspecified protocol. NOTE: this can be leveraged by remote attackers using CVE-2014-9041.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://owncloud.org/security/advisory/?id=oc-sa-2014-028)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-34279, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-34279 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-34279
- **State**: PUBLISHED
- **Published Date**: May 03, 2024 at 01:57 UTC
- **Last Updated**: August 02, 2024 at 16:10 UTC
- **Reserved Date**: May 31, 2023 at 19:51 UTC
- **Assigned By**: zdi
### Vulnerability Description
D-Link DIR-2150 GetDeviceSettings Target Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-2150 routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the SOAP API interface, which listens on TCP port 80 by default. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20558.
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**D-Link - DIR-2150**
Affected versions:
- 1.05B01 (Status: affected)
### References
1. [ZDI-23-630](https://www.zerodayinitiative.com/advisories/ZDI-23-630/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-3282, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-3282 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3282
- **State**: PUBLISHED
- **Published Date**: July 13, 2016 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 23:47 UTC
- **Reserved Date**: March 15, 2016 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word 2016, Word for Mac 2011, Word 2016 for Mac, Office Compatibility Pack SP3, Word Viewer, Word Automation Services on SharePoint Server 2010 SP2, Word Automation Services on SharePoint Server 2013 SP1, SharePoint Server 2016, Office Web Apps 2010 SP2, Office Web Apps Server 2013 SP1, and Office Online Server allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1036274](http://www.securitytracker.com/id/1036274)
2. [1036275](http://www.securitytracker.com/id/1036275)
3. [MS16-088](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-088)
4. [91589](http://www.securityfocus.com/bid/91589)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-49749, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-49749 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-49749
- **State**: PUBLISHED
- **Published Date**: December 15, 2023 at 15:45 UTC
- **Last Updated**: August 02, 2024 at 22:01 UTC
- **Reserved Date**: November 30, 2023 at 13:22 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in SureTriggers SureTriggers – Connect All Your Plugins, Apps, Tools & Automate Everything!.This issue affects SureTriggers – Connect All Your Plugins, Apps, Tools & Automate Everything!: from n/a through 1.0.23.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**SureTriggers - SureTriggers – Connect All Your Plugins, Apps, Tools & Automate Everything!**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/suretriggers/wordpress-suretriggers-plugin-1-0-23-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Rafie Muhammad (Patchstack)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-12942, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-12942 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-12942
- **State**: REJECTED
- **Published Date**: January 14, 2022 at 16:23 UTC
- **Last Updated**: January 14, 2022 at 16:23 UTC
- **Reserved Date**: May 15, 2020 at 00:00 UTC
- **Assigned By**: AMD
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-7538, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-7538 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7538
- **State**: PUBLISHED
- **Published Date**: November 19, 2020 at 21:04 UTC
- **Last Updated**: August 04, 2024 at 09:33 UTC
- **Reserved Date**: January 21, 2020 at 00:00 UTC
- **Assigned By**: schneider
### Vulnerability Description
A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists in PLC Simulator on EcoStruxureª Control Expert (now Unity Pro) (all versions) that could cause a crash of the PLC simulator present in EcoStruxureª Control Expert software when receiving a specially crafted request over Modbus.
### Weakness Classification (CWE)
- CWE-754: Security Weakness
### Affected Products
**n/a - PLC Simulator on EcoStruxureª Control Expert (now Unity Pro) (all versions) **
Affected versions:
- PLC Simulator on EcoStruxureª Control Expert (now Unity Pro) (all versions) (Status: affected)
### References
1. [](https://www.se.com/ww/en/download/document/SEVD-2020-315-07/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2008-2524, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2008-2524 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2524
- **State**: PUBLISHED
- **Published Date**: June 03, 2008 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 09:05 UTC
- **Reserved Date**: June 03, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
BlogPHP 2.0 allows remote attackers to bypass authentication, and post (1) messages or (2) comments as an arbitrary user, via a modified blogphp_username field in a cookie.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [29133](http://www.securityfocus.com/bid/29133)
2. [blogphp-blogphpusername-security-bypass(42372)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42372)
3. [30165](http://secunia.com/advisories/30165)
4. [](http://www.davidsopas.com/soapbox/blogphp.txt)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-2458, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-2458 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-2458
- **State**: PUBLISHED
- **Published Date**: July 20, 2021 at 22:45 UTC
- **Last Updated**: September 25, 2024 at 19:41 UTC
- **Reserved Date**: December 09, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Identity Manager product of Oracle Fusion Middleware (component: Identity Console). Supported versions that are affected are 11.1.2.2.0, 11.1.2.3.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Identity Manager. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Identity Manager, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Identity Manager accessible data as well as unauthorized update, insert or delete access to some of Identity Manager accessible data. CVSS 3.1 Base Score 7.6 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N).
### CVSS Metrics
- **CVSS Base Score**: 7.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N`
### Affected Products
**Oracle Corporation - Identity Manager**
Affected versions:
- 11.1.2.2.0 (Status: affected)
- 11.1.2.3.0 (Status: affected)
- 12.2.1.3.0 (Status: affected)
- 12.2.1.4.0 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujul2021.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-37235, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-37235 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-37235
- **State**: PUBLISHED
- **Published Date**: January 02, 2025 at 12:00 UTC
- **Last Updated**: January 02, 2025 at 16:37 UTC
- **Reserved Date**: June 04, 2024 at 16:46 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Groundhogg Inc. Groundhogg allows Cross Site Request Forgery.This issue affects Groundhogg: from n/a through 3.4.2.3.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Groundhogg Inc. - Groundhogg**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/groundhogg/vulnerability/wordpress-groundhogg-plugin-3-4-2-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Ananda Dhakal (Patchstack)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-1949, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-1949 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-1949
- **State**: PUBLISHED
- **Published Date**: March 04, 2025 at 19:00 UTC
- **Last Updated**: March 04, 2025 at 19:37 UTC
- **Reserved Date**: March 04, 2025 at 14:09 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as problematic, has been found in ZZCMS 2025. This issue affects some unknown processing of the file /3/ucenter_api/code/register_nodb.php of the component URL Handler. The manipulation of the argument $_SERVER['PHP_SELF'] leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
- CWE-94: Code Injection
### Affected Products
**n/a - ZZCMS**
Affected versions:
- 2025 (Status: affected)
### References
1. [VDB-298541 | ZZCMS URL register_nodb.php cross site scripting](https://vuldb.com/?id.298541)
2. [VDB-298541 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.298541)
3. [Submit #508909 | ZZCMS 2025 Cross Site Scripting](https://vuldb.com/?submit.508909)
4. [](https://github.com/Sinon2003/cve/blob/main/zzcms/xss-register_nodb.php.md)
### Credits
- Rorochan (VulDB User)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-31581, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-31581 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-31581
- **State**: PUBLISHED
- **Published Date**: October 24, 2023 at 00:00 UTC
- **Last Updated**: September 17, 2024 at 13:42 UTC
- **Reserved Date**: April 29, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Dromara Sureness before v1.0.8 was discovered to use a hardcoded key.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/dromara/sureness/issues/164)
2. [](https://github.com/xubowenW/JWTissues/blob/main/sureness%20secure%20issues.md)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2008-0519, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2008-0519 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0519
- **State**: PUBLISHED
- **Published Date**: January 31, 2008 at 19:30 UTC
- **Last Updated**: August 07, 2024 at 07:46 UTC
- **Reserved Date**: January 31, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in index.php in the Atapin Jokes (com_jokes) 1.0 component for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the cat parameter in a CatView action.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [5015](https://www.exploit-db.com/exploits/5015)
2. [27522](http://www.securityfocus.com/bid/27522)
3. [jokes-index-sql-injection(40067)](https://exchange.xforce.ibmcloud.com/vulnerabilities/40067)
4. [ADV-2008-0361](http://www.vupen.com/english/advisories/2008/0361)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-16090, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-16090 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16090
- **State**: PUBLISHED
- **Published Date**: November 27, 2018 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 10:17 UTC
- **Reserved Date**: August 29, 2018 at 00:00 UTC
- **Assigned By**: lenovo
### Vulnerability Description
In System Management Module (SMM) versions prior to 1.06, the SMM certificate creation and parsing logic is vulnerable to post-authentication command injection.
### Affected Products
**Lenovo - ThinkSystem SMM**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.lenovo.com/us/en/solutions/LEN-24374)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-5505, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-5505 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5505
- **State**: PUBLISHED
- **Published Date**: January 14, 2020 at 18:08 UTC
- **Last Updated**: August 04, 2024 at 08:30 UTC
- **Reserved Date**: January 05, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Freelancy v1.0.0 allows remote command execution via the "file":"data:application/x-php;base64 substring (in conjunction with "type":"application/x-php"} to the /api/files/ URI.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/155922/Freelancy-1.0.0-Remote-Code-Execution.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-1427, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-1427 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1427
- **State**: PUBLISHED
- **Published Date**: August 29, 2017 at 21:00 UTC
- **Last Updated**: September 16, 2024 at 17:44 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Cognos Analytics 11.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 127579.
### Affected Products
**IBM - Cognos Analytics**
Affected versions:
- 11.0 (Status: affected)
### References
1. [](http://www.ibm.com/support/docview.wss?uid=swg22007242)
2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/127579)
3. [](https://security.netapp.com/advisory/ntap-20190401-0003/)
4. [](https://security.netapp.com/advisory/ntap-20190329-0003/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-0465, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-0465 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0465
- **State**: PUBLISHED
- **Published Date**: March 10, 2021 at 16:18 UTC
- **Last Updated**: August 03, 2024 at 15:40 UTC
- **Reserved Date**: November 06, 2020 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In GenerateFaceMask of face.cc, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-172005755
### Affected Products
**n/a - Android**
Affected versions:
- Android kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2021-03-01)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-4547, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-4547 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4547
- **State**: PUBLISHED
- **Published Date**: February 13, 2017 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 00:32 UTC
- **Reserved Date**: May 05, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Samsung devices with Android KK(4.4), L(5.0/5.1), or M(6.0) allow attackers to cause a denial of service (system crash) via a crafted system call to TvoutService_C.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://security.samsungmobile.com/smrupdate.html#SMR-FEB-2016)
2. [[oss-security] 20160505 Re: CVE request - samsumg android phone TvoutService_C binder service DoS](http://www.openwall.com/lists/oss-security/2016/05/06/2)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-3974, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-3974 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-3974
- **State**: PUBLISHED
- **Published Date**: April 27, 2025 at 15:00 UTC
- **Last Updated**: April 28, 2025 at 14:19 UTC
- **Reserved Date**: April 26, 2025 at 07:17 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability has been found in PHPGurukul COVID19 Testing Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /edit-phlebotomist.php?pid=11. The manipulation of the argument mobilenumber leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**PHPGurukul - COVID19 Testing Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-306310 | PHPGurukul COVID19 Testing Management System edit-phlebotomist.php sql injection](https://vuldb.com/?id.306310)
2. [VDB-306310 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.306310)
3. [Submit #557394 | PHPGurukul COVID19 Testing Management System V1.0 SQL Injection](https://vuldb.com/?submit.557394)
4. [](https://github.com/skyrainoh/CVE/issues/4)
5. [](https://phpgurukul.com/)
### Credits
- l0ners (VulDB User)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-40763, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-40763 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-40763
- **State**: PUBLISHED
- **Published Date**: March 16, 2022 at 14:02 UTC
- **Last Updated**: April 23, 2025 at 18:51 UTC
- **Reserved Date**: September 08, 2021 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Character Animator version 4.4 (and earlier) is affected by a memory corruption vulnerability when parsing a WAF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-788: OS Command Injection
### Affected Products
**Adobe - Character Animator (Preview 4)**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/character_animator/apsb21-95.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-35208, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-35208 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-35208
- **State**: PUBLISHED
- **Published Date**: June 11, 2024 at 11:15 UTC
- **Last Updated**: August 02, 2024 at 03:07 UTC
- **Reserved Date**: May 13, 2024 at 17:54 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V1.2). The affected web server stored the password in cleartext. This could allow attacker in a privileged position to obtain access passwords.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-522: Security Weakness
### Affected Products
**Siemens - SINEC Traffic Analyzer**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/html/ssa-196737.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-29280, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-29280 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-29280
- **State**: PUBLISHED
- **Published Date**: April 15, 2025 at 00:00 UTC
- **Last Updated**: April 15, 2025 at 17:37 UTC
- **Reserved Date**: March 11, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stored cross-site scripting vulnerability exists in PerfreeBlog v4.0.11 in the website name field of the backend system settings interface allows an attacker to insert and execute arbitrary malicious code.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Cray0nLee/CVE/issues/1)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2013-2936, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2013-2936 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-2936
- **State**: PUBLISHED
- **Published Date**: September 12, 2013 at 18:00 UTC
- **Last Updated**: September 16, 2024 at 19:09 UTC
- **Reserved Date**: April 11, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in Citrix CloudPortal Services Manager (aka Cortex) 10.0 before Cumulative Update 3 has unknown impact and attack vectors, a different vulnerability than other CVEs listed in CTX137162.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.citrix.com/article/CTX137162)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-6814, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-6814 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6814
- **State**: PUBLISHED
- **Published Date**: August 21, 2024 at 16:09 UTC
- **Last Updated**: August 21, 2024 at 17:54 UTC
- **Reserved Date**: July 16, 2024 at 21:14 UTC
- **Assigned By**: zdi
### Vulnerability Description
NETGEAR ProSAFE Network Management System getFilterString SQL Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of NETGEAR ProSAFE Network Management System. Authentication is required to exploit this vulnerability.
The specific flaw exists within the getFilterString method. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-23399.
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**NETGEAR - ProSAFE Network Management System**
Affected versions:
- 1.7.0.34 x64 (Status: affected)
### References
1. [ZDI-24-901](https://www.zerodayinitiative.com/advisories/ZDI-24-901/)
2. [vendor-provided URL](https://kb.netgear.com/000066232/Security-Advisory-for-SQL-Injection-on-the-NMS300-PSV-2024-0019)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-57834, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-57834 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-57834
- **State**: PUBLISHED
- **Published Date**: February 27, 2025 at 02:18 UTC
- **Last Updated**: May 04, 2025 at 10:05 UTC
- **Reserved Date**: February 27, 2025 at 02:16 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
media: vidtv: Fix a null-ptr-deref in vidtv_mux_stop_thread
syzbot report a null-ptr-deref in vidtv_mux_stop_thread. [1]
If dvb->mux is not initialized successfully by vidtv_mux_init() in the
vidtv_start_streaming(), it will trigger null pointer dereference about mux
in vidtv_mux_stop_thread().
Adjust the timing of streaming initialization and check it before
stopping it.
[1]
KASAN: null-ptr-deref in range [0x0000000000000128-0x000000000000012f]
CPU: 0 UID: 0 PID: 5842 Comm: syz-executor248 Not tainted 6.13.0-rc4-syzkaller-00012-g9b2ffa6148b1 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
RIP: 0010:vidtv_mux_stop_thread+0x26/0x80 drivers/media/test-drivers/vidtv/vidtv_mux.c:471
Code: 90 90 90 90 66 0f 1f 00 55 53 48 89 fb e8 82 2e c8 f9 48 8d bb 28 01 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 02 7e 3b 0f b6 ab 28 01 00 00 31 ff 89 ee e8
RSP: 0018:ffffc90003f2faa8 EFLAGS: 00010202
RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffff87cfb125
RDX: 0000000000000025 RSI: ffffffff87d120ce RDI: 0000000000000128
RBP: ffff888029b8d220 R08: 0000000000000005 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000003 R12: ffff888029b8d188
R13: ffffffff8f590aa0 R14: ffffc9000581c5c8 R15: ffff888029a17710
FS: 00007f7eef5156c0(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f7eef5e635c CR3: 0000000076ca6000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
vidtv_stop_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:209 [inline]
vidtv_stop_feed+0x151/0x250 drivers/media/test-drivers/vidtv/vidtv_bridge.c:252
dmx_section_feed_stop_filtering+0x90/0x160 drivers/media/dvb-core/dvb_demux.c:1000
dvb_dmxdev_feed_stop.isra.0+0x1ee/0x270 drivers/media/dvb-core/dmxdev.c:486
dvb_dmxdev_filter_stop+0x22a/0x3a0 drivers/media/dvb-core/dmxdev.c:559
dvb_dmxdev_filter_free drivers/media/dvb-core/dmxdev.c:840 [inline]
dvb_demux_release+0x92/0x550 drivers/media/dvb-core/dmxdev.c:1246
__fput+0x3f8/0xb60 fs/file_table.c:450
task_work_run+0x14e/0x250 kernel/task_work.c:239
get_signal+0x1d3/0x2610 kernel/signal.c:2790
arch_do_signal_or_restart+0x90/0x7e0 arch/x86/kernel/signal.c:337
exit_to_user_mode_loop kernel/entry/common.c:111 [inline]
exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline]
__syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline]
syscall_exit_to_user_mode+0x150/0x2a0 kernel/entry/common.c:218
do_syscall_64+0xda/0x250 arch/x86/entry/common.c:89
entry_SYSCALL_64_after_hwframe+0x77/0x7f
### Affected Products
**Linux - Linux**
Affected versions:
- f90cf6079bf67988f8b1ad1ade70fc89d0080905 (Status: affected)
- f90cf6079bf67988f8b1ad1ade70fc89d0080905 (Status: affected)
- f90cf6079bf67988f8b1ad1ade70fc89d0080905 (Status: affected)
- f90cf6079bf67988f8b1ad1ade70fc89d0080905 (Status: affected)
- f90cf6079bf67988f8b1ad1ade70fc89d0080905 (Status: affected)
- f90cf6079bf67988f8b1ad1ade70fc89d0080905 (Status: affected)
- f90cf6079bf67988f8b1ad1ade70fc89d0080905 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.10 (Status: affected)
- 0 (Status: unaffected)
- 5.10.235 (Status: unaffected)
- 5.15.179 (Status: unaffected)
- 6.1.129 (Status: unaffected)
- 6.6.79 (Status: unaffected)
- 6.12.16 (Status: unaffected)
- 6.13.4 (Status: unaffected)
- 6.14 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/52d3512f9a7a52ef92864679b1e8e8aa16202c6a)
2. [](https://git.kernel.org/stable/c/59a707ad952eb2ea8d59457d662b6f4138f17b08)
3. [](https://git.kernel.org/stable/c/86307e443c5844f38e1b98e2c51a4195c55576cd)
4. [](https://git.kernel.org/stable/c/2c5601b99d79d196fe4a37159e3dfb38e778ea18)
5. [](https://git.kernel.org/stable/c/95432a37778c9c5dd105b7b9f19e9695c9e166cf)
6. [](https://git.kernel.org/stable/c/904a8323cc8afa7eb9ce3e67303a2b3f2f787306)
7. [](https://git.kernel.org/stable/c/1221989555db711578a327a9367f1be46500cb48)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2009-0381, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2009-0381 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0381
- **State**: PUBLISHED
- **Published Date**: February 02, 2009 at 18:33 UTC
- **Last Updated**: August 07, 2024 at 04:31 UTC
- **Reserved Date**: February 02, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in the BazaarBuilder Ecommerce Shopping Cart (com_prod) 5.0 component for Joomla! allows remote attackers to execute arbitrary SQL commands via the cid parameter in a products action to index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [33380](http://www.securityfocus.com/bid/33380)
2. [33612](http://secunia.com/advisories/33612)
3. [7840](https://www.exploit-db.com/exploits/7840)
4. [bazaarbuilder-index-sql-injection(48141)](https://exchange.xforce.ibmcloud.com/vulnerabilities/48141)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-24523, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-24523 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-24523
- **State**: REJECTED
- **Last Updated**: March 22, 2023 at 00:00 UTC
- **Reserved Date**: August 19, 2020 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-13768, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-13768 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-13768
- **State**: PUBLISHED
- **Published Date**: July 09, 2018 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 09:14 UTC
- **Reserved Date**: July 08, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The mintToken function of a smart contract implementation for ZToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md)
2. [](https://github.com/BlockChainsSecurity/EtherTokens/tree/master/ZToken)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2006-3229, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2006-3229 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3229
- **State**: PUBLISHED
- **Published Date**: June 27, 2006 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 18:23 UTC
- **Reserved Date**: June 26, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Open WebMail (OWM) 2.52, and other versions released before 05/12/2006, allows remote attackers to inject arbitrary web script or HTML via the (1) To and (2) From fields in openwebmail-main.pl, and possibly (3) other unspecified vectors related to "openwebmailerror calls that need to display HTML."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [openwebmail-read-xss(27309)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27309)
2. [20714](http://secunia.com/advisories/20714)
3. [](http://openwebmail.acatysmoof.com/dev/svn/index.pl/openwebmail/diff/trunk/src/cgi-bin/openwebmail/openwebmail-main.pl?rev1=235%3Brev2=236)
4. [](http://openwebmail.org/openwebmail/doc/changes.txt)
5. [20060626 Openwebmail: 2 XSS vulns not one, and some version hints](http://www.attrition.org/pipermail/vim/2006-June/000902.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-7706, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-7706 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-7706
- **State**: PUBLISHED
- **Published Date**: August 12, 2024 at 22:31 UTC
- **Last Updated**: August 13, 2024 at 14:04 UTC
- **Reserved Date**: August 12, 2024 at 16:07 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Fujian mwcms 1.0.0. It has been rated as critical. Affected by this issue is the function uploadimage of the file /uploadfile.html. The manipulation of the argument upfile leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 4.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**Fujian - mwcms**
Affected versions:
- 1.0.0 (Status: affected)
### References
1. [VDB-274184 | Fujian mwcms uploadfile.html uploadimage unrestricted upload](https://vuldb.com/?id.274184)
2. [VDB-274184 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.274184)
3. [Submit #385651 | mainwww.com mwcms v1.0.0 FileUpload](https://vuldb.com/?submit.385651)
4. [](https://github.com/DeepMountains/Mirage/blob/main/CVE12-2.md)
### Credits
- Dee.Mirage (VulDB User)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2013-3624, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2013-3624 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-3624
- **State**: PUBLISHED
- **Published Date**: October 03, 2013 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 16:14 UTC
- **Reserved Date**: May 21, 2013 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The OS deployment feature in Baramundi Management Suite 7.5 through 8.9 stores credentials in cleartext on deployed machines, which allows remote attackers to obtain sensitive information by reading a file. NOTE: this ID was also incorrectly mapped to a separate issue in Oracle Outside In, but the correct ID for that issue is CVE-2013-5763.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#392654](http://www.kb.cert.org/vuls/id/392654)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-2317, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-2317 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2317
- **State**: PUBLISHED
- **Published Date**: March 05, 2020 at 08:56 UTC
- **Last Updated**: August 04, 2024 at 18:49 UTC
- **Reserved Date**: December 10, 2018 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
The secret key used to make the Initial Sequence Number in the TCP SYN packet could be brute forced and therefore can be predicted in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MSM8905, MSM8909, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, Nicobar, QCM2150, QM215, SC8180X, SDM429, SDM439, SDM450, SDM632, SDX24, SDX55, SM6150, SM7150, SM8150
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables**
Affected versions:
- MSM8905, MSM8909, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, Nicobar, QCM2150, QM215, SC8180X, SDM429, SDM439, SDM450, SDM632, SDX24, SDX55, SM6150, SM7150, SM8150 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2007-6349, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2007-6349 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-6349
- **State**: PUBLISHED
- **Published Date**: December 20, 2007 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 16:02 UTC
- **Reserved Date**: December 14, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
P4Webs.exe in Perforce P4Web 2006.2 and earlier, when running on Windows, allows remote attackers to cause a denial of service (CPU consumption) via an HTTP request with an empty body and a Content-Length greater than 0.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [3476](http://securityreason.com/securityalert/3476)
2. [28158](http://secunia.com/advisories/28158)
3. [39297](http://www.osvdb.org/39297)
4. [](http://www.symantec.com/content/en/us/enterprise/research/SYMSA-2007-015.txt)
5. [26806](http://www.securityfocus.com/bid/26806)
6. [p4web-contentlength-dos(39142)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39142)
7. [20071218 SYMSA-2007-015](http://www.securityfocus.com/archive/1/485321/100/0/threaded)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-41871, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-41871 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-41871
- **State**: PUBLISHED
- **Published Date**: December 15, 2021 at 05:49 UTC
- **Last Updated**: August 04, 2024 at 03:22 UTC
- **Reserved Date**: October 04, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Socomec REMOTE VIEW PRO 2.0.41.4. Improper validation of input into the username field makes it possible to place a stored XSS payload. This is executed if an administrator views the System Event Log.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.socomec.com/remote-view-software_en.html)
2. [](https://f20.be/cves/socomec)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-7277, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-7277 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-7277
- **State**: PUBLISHED
- **Published Date**: February 21, 2018 at 01:00 UTC
- **Last Updated**: September 16, 2024 at 22:56 UTC
- **Reserved Date**: February 20, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered on RLE Wi-MGR/FDS-Wi 6.2 devices. Persistent XSS exists in the web server. Remote attackers can inject malicious JavaScript code using the device's BACnet implementation. This is similar to a Cross Protocol Injection with SNMP.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://misteralfa-hack.blogspot.com/2018/02/bacnet-entrando-en-materia.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-32566, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-32566 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-32566
- **State**: PUBLISHED
- **Published Date**: April 17, 2025 at 15:47 UTC
- **Last Updated**: April 17, 2025 at 18:28 UTC
- **Reserved Date**: April 09, 2025 at 11:20 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ashraful Sarkar Naiem License For Envato allows Reflected XSS. This issue affects License For Envato: from n/a through 1.0.0.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Ashraful Sarkar Naiem - License For Envato**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/license-envato/vulnerability/wordpress-license-for-envato-plugin-1-0-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- 0xd4rk5id3 (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-14195, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-14195 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14195
- **State**: PUBLISHED
- **Published Date**: June 16, 2020 at 15:07 UTC
- **Last Updated**: August 04, 2024 at 12:39 UTC
- **Reserved Date**: June 16, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to org.jsecurity.realm.jndi.JndiRealmFactory (aka org.jsecurity).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/FasterXML/jackson-databind/issues/2765)
2. [[debian-lts-announce] 20200701 [SECURITY] [DLA 2270-1] jackson-databind security update](https://lists.debian.org/debian-lts-announce/2020/07/msg00001.html)
3. [](https://www.oracle.com/security-alerts/cpuoct2020.html)
4. [](https://security.netapp.com/advisory/ntap-20200702-0003/)
5. [](https://www.oracle.com/security-alerts/cpujan2021.html)
6. [](https://www.oracle.com/security-alerts/cpuApr2021.html)
7. [](https://www.oracle.com//security-alerts/cpujul2021.html)
8. [](https://www.oracle.com/security-alerts/cpuoct2021.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-14006, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-14006 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-14006
- **State**: PUBLISHED
- **Published Date**: January 21, 2020 at 06:30 UTC
- **Last Updated**: August 05, 2024 at 00:05 UTC
- **Reserved Date**: July 19, 2019 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Buffer overflow occur while playing the clip which is nonstandard due to lack of offset length check in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8064, APQ8096AU, APQ8098, MDM9206, MDM9207C, MDM9607, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8939, MSM8940, MSM8953, MSM8996, MSM8996AU, Nicobar, QCS605, QM215, Rennell, SA6155P, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SM6150, SM7150, SM8150, SM8250, SXR2130
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables**
Affected versions:
- APQ8009, APQ8017, APQ8053, APQ8064, APQ8096AU, APQ8098, MDM9206, MDM9207C, MDM9607, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8939, MSM8940, MSM8953, MSM8996, MSM8996AU, Nicobar, QCS605, QM215, Rennell, SA6155P, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SM6150, SM7150, SM8150, SM8250, SXR2130 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-50092, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-50092 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-50092
- **State**: PUBLISHED
- **Published Date**: January 03, 2024 at 00:00 UTC
- **Last Updated**: November 14, 2024 at 19:05 UTC
- **Reserved Date**: December 04, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
APIIDA API Gateway Manager for Broadcom Layer7 v2023.2 is vulnerable to Cross Site Scripting (XSS).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://apiida.com/product/apiida-api-gateway-manager/)
2. [](https://senscybersecurity.nl/cve-2023-50092-explained/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-56726, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-56726 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-56726
- **State**: PUBLISHED
- **Published Date**: December 29, 2024 at 11:30 UTC
- **Last Updated**: May 04, 2025 at 10:03 UTC
- **Reserved Date**: December 27, 2024 at 15:00 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
octeontx2-pf: handle otx2_mbox_get_rsp errors in cn10k.c
Add error pointer check after calling otx2_mbox_get_rsp().
### Affected Products
**Linux - Linux**
Affected versions:
- 2ca89a2c37527221edc549ffd3b65c6f8d9d4088 (Status: affected)
- 2ca89a2c37527221edc549ffd3b65c6f8d9d4088 (Status: affected)
- 2ca89a2c37527221edc549ffd3b65c6f8d9d4088 (Status: affected)
- 2ca89a2c37527221edc549ffd3b65c6f8d9d4088 (Status: affected)
- 2ca89a2c37527221edc549ffd3b65c6f8d9d4088 (Status: affected)
- 2ca89a2c37527221edc549ffd3b65c6f8d9d4088 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.14 (Status: affected)
- 0 (Status: unaffected)
- 5.15.174 (Status: unaffected)
- 6.1.120 (Status: unaffected)
- 6.6.64 (Status: unaffected)
- 6.11.11 (Status: unaffected)
- 6.12.2 (Status: unaffected)
- 6.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/a374e7e79fbdd7574bd89344447b0d4b91ba9801)
2. [](https://git.kernel.org/stable/c/856ad633e11869729be698df2287ecfe6ec31f27)
3. [](https://git.kernel.org/stable/c/c5a6c5af434671aea739a5a41c849819144f02c9)
4. [](https://git.kernel.org/stable/c/41f39f4c67253f802809310be6846ff408c3c758)
5. [](https://git.kernel.org/stable/c/54abcec092616a4d01195355eb5d6036fb8fe363)
6. [](https://git.kernel.org/stable/c/ac9183023b6a9c09467516abd8aab04f9a2f9564)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-10847, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-10847 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-10847
- **State**: PUBLISHED
- **Published Date**: July 30, 2018 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 07:46 UTC
- **Reserved Date**: May 09, 2018 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
prosody before versions 0.10.2, 0.9.14 is vulnerable to an Authentication Bypass. Prosody did not verify that the virtual host associated with a user session remained the same across stream restarts. A user may authenticate to XMPP host A and migrate their authenticated session to XMPP host B of the same Prosody instance.
### Weakness Classification (CWE)
- CWE-592: Security Weakness
### Affected Products
**[UNKNOWN] - prosody**
Affected versions:
- 0.10.2 (Status: affected)
- 0.9.14 (Status: affected)
### References
1. [](https://issues.prosody.im/1147)
2. [](https://blog.prosody.im/prosody-0-10-2-security-release/)
3. [DSA-4216](https://www.debian.org/security/2018/dsa-4216)
4. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10847)
5. [](https://prosody.im/security/advisory_20180531/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-48793, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-48793 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-48793
- **State**: REJECTED
- **Last Updated**: May 27, 2025 at 02:55 UTC
- **Reserved Date**: May 26, 2025 at 07:43 UTC
- **Assigned By**: fortinet
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2012-1081, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2012-1081 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-1081
- **State**: PUBLISHED
- **Published Date**: February 14, 2012 at 17:00 UTC
- **Last Updated**: September 17, 2024 at 03:52 UTC
- **Reserved Date**: February 14, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the Yet another Google search (ya_googlesearch) extension before 0.3.10 for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2012-001/)
2. [78795](http://osvdb.org/78795)
3. [](http://typo3.org/extensions/repository/view/ya_googlesearch/0.3.10/)
4. [51851](http://www.securityfocus.com/bid/51851)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-21270, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-21270 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21270
- **State**: PUBLISHED
- **Published Date**: January 22, 2021 at 18:05 UTC
- **Last Updated**: August 03, 2024 at 18:09 UTC
- **Reserved Date**: December 22, 2020 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
OctopusDSC is a PowerShell module with DSC resources that can be used to install and configure an Octopus Deploy Server and Tentacle agent. In OctopusDSC version 4.0.977 and earlier a customer API key used to connect to Octopus Server is exposed via logging in plaintext. This vulnerability is patched in version 4.0.1002.
### CVSS Metrics
- **CVSS Base Score**: 6.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-319: Security Weakness
### Affected Products
**OctopusDeploy - OctopusDSC**
Affected versions:
- < 4.0.1002 (Status: affected)
### References
1. [](https://github.com/OctopusDeploy/OctopusDSC/security/advisories/GHSA-phmm-rfg9-94fm)
2. [](https://github.com/OctopusDeploy/OctopusDSC/releases/tag/v4.0.1002)
3. [](https://github.com/OctopusDeploy/OctopusDSC/pull/270)
4. [](https://github.com/OctopusDeploy/OctopusDSC/commit/24b448e6ac964ed938475add494a145c0473ac42)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2006-1214, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2006-1214 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1214
- **State**: PUBLISHED
- **Published Date**: March 14, 2006 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 17:03 UTC
- **Reserved Date**: March 14, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
UnrealIRCd 3.2.3 allows remote attackers to cause an unspecified denial of service by causing a linked server to send malformed TKL Q:Line commands, as demonstrated by "TKL - q\x08Q *\x08PoC."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://forums.unrealircd.com/viewtopic.php?t=2985)
2. [unrealircd-server-link-dos(25130)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25130)
3. [19188](http://secunia.com/advisories/19188)
4. [23778](http://www.osvdb.org/23778)
5. [17057](http://www.securityfocus.com/bid/17057)
6. [20060309 UnrealIRCd3.2.3 Server-Link Denial of Service](http://www.securityfocus.com/archive/1/427213/100/0/threaded)
7. [ADV-2006-0908](http://www.vupen.com/english/advisories/2006/0908)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-24588, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-24588 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-24588
- **State**: PUBLISHED
- **Published Date**: September 06, 2021 at 11:09 UTC
- **Last Updated**: August 03, 2024 at 19:35 UTC
- **Reserved Date**: January 14, 2021 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The SMS Alert Order Notifications WordPress plugin before 3.4.7 is affected by a cross site scripting (XSS) vulnerability in the plugin's setting page.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Unknown - SMS Alert Order Notifications – WooCommerce**
Affected versions:
- 3.4.7 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/dc2ce546-9da1-442c-8ee2-cd660634501f)
### Credits
- swapnil bodekar
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2013-1619, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2013-1619 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1619
- **State**: PUBLISHED
- **Published Date**: February 08, 2013 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 15:04 UTC
- **Reserved Date**: February 05, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The TLS implementation in GnuTLS before 2.12.23, 3.0.x before 3.0.28, and 3.1.x before 3.1.7 does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [57260](http://secunia.com/advisories/57260)
2. [](https://gitorious.org/gnutls/gnutls/commit/328ee22c1b3951e060c7124c7cb1cee592c59bc0)
3. [](http://www.gnutls.org/security.html#GNUTLS-SA-2013-1)
4. [](http://www.isg.rhul.ac.uk/tls/TLStiming.pdf)
5. [57274](http://secunia.com/advisories/57274)
6. [[oss-security] 20130205 Re: CVE request: TLS CBC padding timing flaw in various SSL / TLS implementations](http://openwall.com/lists/oss-security/2013/02/05/24)
7. [SUSE-SU-2014:0320](http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html)
8. [SUSE-SU-2014:0322](http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00003.html)
9. [](http://nmav.gnutls.org/2013/02/time-is-money-for-cbc-ciphersuites.html)
10. [USN-1752-1](http://www.ubuntu.com/usn/USN-1752-1)
11. [openSUSE-SU-2013:0807](http://lists.opensuse.org/opensuse-updates/2013-05/msg00023.html)
12. [openSUSE-SU-2014:0346](http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00009.html)
13. [RHSA-2013:0588](http://rhn.redhat.com/errata/RHSA-2013-0588.html)
14. [](https://gitorious.org/gnutls/gnutls/commit/b8391806cd79095fe566f2401d8c7ad85a64b198)
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.