System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-0258, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-0258 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-0258
- **State**: PUBLISHED
- **Published Date**: January 18, 2006 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 16:25 UTC
- **Reserved Date**: January 18, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in the Connection Manager component of Oracle Database server 8.1.7.4 and 9.0.1.5 has unspecified impact and attack vectors, as identified by Oracle Vuln# DB03.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oracle-january2006-update(24321)](https://exchange.xforce.ibmcloud.com/vulnerabilities/24321)
2. [18493](http://secunia.com/advisories/18493)
3. [ADV-2006-0323](http://www.vupen.com/english/advisories/2006/0323)
4. [16287](http://www.securityfocus.com/bid/16287)
5. [VU#545804](http://www.kb.cert.org/vuls/id/545804)
6. [1015499](http://securitytracker.com/id?1015499)
7. [ADV-2006-0243](http://www.vupen.com/english/advisories/2006/0243)
8. [](http://www.oracle.com/technetwork/topics/security/cpujan2006-082403.html)
9. [18608](http://secunia.com/advisories/18608) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-0655, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-0655 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0655
- **State**: PUBLISHED
- **Published Date**: January 21, 2013 at 16:00 UTC
- **Last Updated**: September 17, 2024 at 00:51 UTC
- **Reserved Date**: December 19, 2012 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
The client in Schneider Electric Software Update (SESU) Utility 1.0.x and 1.1.x does not ensure that updates have a valid origin, which allows man-in-the-middle attackers to spoof updates, and consequently execute arbitrary code, by modifying the data stream on TCP port 80.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.schneider-electric.com/download/ww/en/details/29960967-SE-Software-Update-Utility-Vulnerability-Disclosure/?reference=SEVD-2013-009-01)
2. [](http://www2.schneider-electric.com/corporate/en/support/cybersecurity/viewer-news.page?c_filepath=/templatedata/Content/News/data/en/local/cybersecurity/general_information/2013/01/20130109_advisory_of_vulnerability_affecting_schneider_electric_s_software_upda.xml)
3. [](http://www.us-cert.gov/control_systems/pdf/ICSA-13-016-01.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-1366, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-1366 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-1366
- **State**: PUBLISHED
- **Published Date**: October 10, 2019 at 13:28 UTC
- **Last Updated**: August 04, 2024 at 18:13 UTC
- **Reserved Date**: November 26, 2018 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1307, CVE-2019-1308, CVE-2019-1335.
### Affected Products
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows Server 2016**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1607 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1607 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1703 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1703 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1709 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1709 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1803 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1803 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1803 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1809 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1809 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1809 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows Server 2019**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1709 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1903 for 32-bit Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1903 for x64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based) on Windows 10 Version 1903 for ARM64-based Systems**
Affected versions:
- unspecified (Status: affected)
**Microsoft - ChakraCore**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1366) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-31517, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-31517 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-31517
- **State**: REJECTED
- **Last Updated**: April 01, 2025 at 02:55 UTC
- **Reserved Date**: March 31, 2025 at 09:51 UTC
- **Assigned By**: fortinet
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-2859, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-2859 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-2859
- **State**: PUBLISHED
- **Published Date**: August 06, 2012 at 15:00 UTC
- **Last Updated**: September 17, 2024 at 03:27 UTC
- **Reserved Date**: May 19, 2012 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Google Chrome before 21.0.1180.57 on Linux does not properly handle tabs, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://code.google.com/p/chromium/issues/detail?id=137541)
2. [](http://googlechromereleases.blogspot.com/2012/07/stable-channel-release.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-30207, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-30207 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-30207
- **State**: PUBLISHED
- **Published Date**: May 14, 2024 at 10:02 UTC
- **Last Updated**: August 02, 2024 at 01:25 UTC
- **Reserved Date**: March 25, 2024 at 14:21 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in SIMATIC RTLS Locating Manager (6GT2780-0DA00) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-0DA10) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-0DA20) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-0DA30) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-1EA10) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-1EA20) (All versions < V3.0.1.1), SIMATIC RTLS Locating Manager (6GT2780-1EA30) (All versions < V3.0.1.1). The affected systems use symmetric cryptography with a hard-coded key to protect the communication between client and server. This could allow an unauthenticated remote attacker to compromise confidentiality and integrity of the communication and, subsequently, availability of the system.
A successful exploit requires the attacker to gain knowledge of the hard-coded key and to be able to intercept the communication between client and server on the network.
### CVSS Metrics
- **CVSS Base Score**: 10/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-321: Security Weakness
### Affected Products
**Siemens - SIMATIC RTLS Locating Manager**
Affected versions:
- 0 (Status: affected)
**Siemens - SIMATIC RTLS Locating Manager**
Affected versions:
- 0 (Status: affected)
**Siemens - SIMATIC RTLS Locating Manager**
Affected versions:
- 0 (Status: affected)
**Siemens - SIMATIC RTLS Locating Manager**
Affected versions:
- 0 (Status: affected)
**Siemens - SIMATIC RTLS Locating Manager**
Affected versions:
- 0 (Status: affected)
**Siemens - SIMATIC RTLS Locating Manager**
Affected versions:
- 0 (Status: affected)
**Siemens - SIMATIC RTLS Locating Manager**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/html/ssa-093430.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-1145, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-1145 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-1145
- **State**: PUBLISHED
- **Published Date**: May 10, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 02:19 UTC
- **Reserved Date**: May 04, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in friendmail.php in OpenAutoClassifieds 1.0 allows remote attackers to inject arbitrary web script or HTML via the listing parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [2767](http://www.osvdb.org/2767)
2. [openautoclassifieds-friendmail-xss(13604)](https://exchange.xforce.ibmcloud.com/vulnerabilities/13604)
3. [8972](http://www.securityfocus.com/bid/8972)
4. [10138](http://secunia.com/advisories/10138)
5. [20031107 OpenAutoClassifieds XSS attack](http://www.securityfocus.com/archive/1/343806) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-0476, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-0476 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-0476
- **State**: PUBLISHED
- **Published Date**: February 08, 2009 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 04:31 UTC
- **Reserved Date**: February 08, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in MultiMedia Soft AdjMmsEng.dll 7.11.1.0 and 7.11.2.7, as distributed in multiple MultiMedia Soft audio components for .NET, allows remote attackers to execute arbitrary code via a long string in a playlist (.pls) file, as originally reported for Euphonics Audio Player 1.0. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [7958](https://www.exploit-db.com/exploits/7958)
2. [20090203 Euphonics Audio Player v1.0 (.pls) Local BOF POC](http://www.securityfocus.com/archive/1/500652/100/0/threaded)
3. [33817](http://secunia.com/advisories/33817)
4. [33791](http://secunia.com/advisories/33791)
5. [33589](http://www.securityfocus.com/bid/33589)
6. [7973](https://www.exploit-db.com/exploits/7973)
7. [7974](https://www.exploit-db.com/exploits/7974)
8. [ADV-2009-0316](http://www.vupen.com/english/advisories/2009/0316) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-1548, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-1548 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-1548
- **State**: PUBLISHED
- **Published Date**: January 06, 2017 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 23:02 UTC
- **Reserved Date**: January 07, 2016 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer->dst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched.
### Affected Products
**NTP Project - NTP**
Affected versions:
- 4.2.8p4 (Status: affected)
**NTPsec Project - NTPSec**
Affected versions:
- aa48d001683e5b791a743ec9c575aaf7d867a2b0c (Status: affected)
### References
1. [USN-3096-1](http://www.ubuntu.com/usn/USN-3096-1)
2. [DSA-3629](http://www.debian.org/security/2016/dsa-3629)
3. [](http://www.talosintelligence.com/reports/TALOS-2016-0082/)
4. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html)
5. [RHSA-2016:1141](https://access.redhat.com/errata/RHSA-2016:1141)
6. [SUSE-SU-2016:1912](http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html)
7. [88264](http://www.securityfocus.com/bid/88264)
8. [VU#718152](https://www.kb.cert.org/vuls/id/718152)
9. [RHSA-2016:1552](http://rhn.redhat.com/errata/RHSA-2016-1552.html)
10. [1035705](http://www.securitytracker.com/id/1035705)
11. [](http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html)
12. [](https://security.netapp.com/advisory/ntap-20171004-0002/)
13. [20160428 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: April 2016](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd)
14. [FreeBSD-SA-16:16](https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc)
15. [SUSE-SU-2016:2094](http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html)
16. [openSUSE-SU-2016:1423](http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html)
17. [GLSA-201607-15](https://security.gentoo.org/glsa/201607-15)
18. [openSUSE-SU-2016:1329](http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html)
19. [](http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html)
20. [SUSE-SU-2016:1471](http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html)
21. [](https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0082)
22. [FEDORA-2016-5b2eb0bf9c](http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184669.html)
23. [SUSE-SU-2016:1291](http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html)
24. [DSA-3629](https://www.debian.org/security/2016/dsa-3629)
25. [20160429 [slackware-security] ntp (SSA:2016-120-01)](http://www.securityfocus.com/archive/1/538233/100/0/threaded)
26. [SUSE-SU-2016:1568](http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html)
27. [20160429 [slackware-security] ntp (SSA:2016-120-01)](http://www.securityfocus.com/archive/1/archive/1/538233/100/0/threaded)
28. [SUSE-SU-2016:1278](http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html)
29. [FEDORA-2016-ed8c6c0426](http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183647.html)
30. [](https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf)
31. [](https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11)
32. [](https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf)
33. [](https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11)
34. [](https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-5516, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-5516 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-5516
- **State**: PUBLISHED
- **Published Date**: January 20, 2009 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 10:56 UTC
- **Reserved Date**: December 12, 2008 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The web interface in git (gitweb) 1.5.x before 1.5.5 allows remote attackers to execute arbitrary commands via shell metacharacters related to git_search.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-1708](http://www.debian.org/security/2009/dsa-1708)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=479715)
3. [GLSA-200903-15](http://www.gentoo.org/security/en/glsa/glsa-200903-15.xml)
4. [](http://wiki.rpath.com/Advisories:rPSA-2009-0005)
5. [ADV-2009-0175](http://www.vupen.com/english/advisories/2009/0175)
6. [](http://repo.or.cz/w/git.git?a=commitdiff%3Bh=c582abae)
7. [4919](http://securityreason.com/securityalert/4919)
8. [34194](http://secunia.com/advisories/34194)
9. [33964](http://secunia.com/advisories/33964)
10. [SUSE-SR:2009:001](http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00002.html)
11. [[oss-security] 20090123 Re: CVE request -- git](http://www.openwall.com/lists/oss-security/2009/01/23/2)
12. [20090113 rPSA-2009-0005-1 git gitweb](http://www.securityfocus.com/archive/1/500008/100/0/threaded)
13. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=512330)
14. [[oss-security] 20090120 Re: CVE request -- git](http://www.openwall.com/lists/oss-security/2009/01/20/1)
15. [[oss-security] 20090121 Re: CVE request -- git](http://www.openwall.com/lists/oss-security/2009/01/21/7)
16. [](https://issues.rpath.com/browse/RPL-2936)
17. [USN-723-1](http://www.ubuntu.com/usn/USN-723-1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-15970, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-15970 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-15970
- **State**: PUBLISHED
- **Published Date**: November 03, 2020 at 02:21 UTC
- **Last Updated**: August 04, 2024 at 13:30 UTC
- **Reserved Date**: July 27, 2020 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use after free in NFC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html)
2. [](https://crbug.com/1108299)
3. [openSUSE-SU-2020:1829](http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html)
4. [FEDORA-2020-127d40f1ab](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4GWCWNHTTYOH6HSFUXPGPBB6J6JYZHZE/)
5. [FEDORA-2020-8aca25b5c8](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/24QFL4C3AZKMFVL7LVSYMU2DNE5VVUGS/)
6. [FEDORA-2020-4e8e48da22](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SC3U3H6AISVZB5PLZLLNF4HMQ4UFFL7M/)
7. [DSA-4824](https://www.debian.org/security/2021/dsa-4824) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-4428, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-4428 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-4428
- **State**: REJECTED
- **Published Date**: March 16, 2018 at 14:04 UTC
- **Last Updated**: March 16, 2018 at 13:57 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-16767, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-16767 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16767
- **State**: PUBLISHED
- **Published Date**: September 10, 2018 at 04:00 UTC
- **Last Updated**: August 05, 2024 at 10:32 UTC
- **Reserved Date**: September 09, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In WAVM through 2018-07-26, a crafted file sent to the WebAssembly Virtual Machine may cause a denial of service (application crash) or possibly have unspecified other impact because of an unspecified "heap-buffer-overflow" condition in FunctionValidationContext::popAndValidateOperand.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/AndrewScheidecker/WAVM/issues/97) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0392, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0392 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0392
- **State**: PUBLISHED
- **Published Date**: March 10, 2021 at 15:41 UTC
- **Last Updated**: August 03, 2024 at 15:40 UTC
- **Reserved Date**: November 06, 2020 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In main of main.cpp, there is a possible memory corruption due to a double free. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-175124730
### Affected Products
**n/a - Android**
Affected versions:
- Android-10 Android-11 Android-9 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2021-03-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-40094, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-40094 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-40094
- **State**: PUBLISHED
- **Published Date**: December 07, 2021 at 12:51 UTC
- **Last Updated**: August 04, 2024 at 02:27 UTC
- **Reserved Date**: August 25, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A DOM-based XSS vulnerability affects SquaredUp for SCOM 5.2.1.6654. If successfully exploited, this vulnerability may allow attackers to inject malicious code into a user's device.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.squaredup.com)
2. [](https://support.squaredup.com/hc/en-us/articles/4410656395537-CVE-2021-40094-DOM-based-stored-cross-site-scripting) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-31276, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-31276 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-31276
- **State**: PUBLISHED
- **Published Date**: February 12, 2025 at 21:19 UTC
- **Last Updated**: February 13, 2025 at 15:11 UTC
- **Reserved Date**: June 09, 2023 at 03:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Heap-based buffer overflow in BMC Firmware for the Intel(R) Server Board S2600WF, Intel(R) Server Board S2600ST, Intel(R) Server Board S2600BP, before version 02.01.0017 and Intel(R) Server Board M50CYP and Intel(R) Server Board D50TNP before version R01.01.0009 may allow a privileged user to enable escalation of privilege via local access.
### CVSS Metrics
- **CVSS Base Score**: 8.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**n/a - Intel(R) Server Board S2600WF, Intel(R) Server Board S2600ST, Intel(R) Server Board S2600BP, Intel(R) Server Board M50CYP and Intel(R) Server Board D50TNP**
Affected versions:
- See references (Status: affected)
### References
1. [https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00990.html](https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00990.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-5904, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-5904 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-5904
- **State**: PUBLISHED
- **Published Date**: January 15, 2014 at 01:33 UTC
- **Last Updated**: August 06, 2024 at 17:29 UTC
- **Reserved Date**: September 18, 2013 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in Oracle Java SE 7u45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [56535](http://secunia.com/advisories/56535)
2. [RHSA-2014:0030](http://rhn.redhat.com/errata/RHSA-2014-0030.html)
3. [56485](http://secunia.com/advisories/56485)
4. [SSRT101454](http://marc.info/?l=bugtraq&m=139402697611681&w=2)
5. [](https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777)
6. [64890](http://www.securityfocus.com/bid/64890)
7. [HPSBUX02972](http://marc.info/?l=bugtraq&m=139402697611681&w=2)
8. [1029608](http://www.securitytracker.com/id/1029608)
9. [101993](http://osvdb.org/101993)
10. [64758](http://www.securityfocus.com/bid/64758)
11. [](http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html)
12. [oracle-cpujan2014-cve20135904(90336)](https://exchange.xforce.ibmcloud.com/vulnerabilities/90336) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-28506, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-28506 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-28506
- **State**: PUBLISHED
- **Published Date**: April 25, 2022 at 12:53 UTC
- **Last Updated**: August 03, 2024 at 05:56 UTC
- **Reserved Date**: April 04, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
There is a heap-buffer-overflow in GIFLIB 5.2.1 function DumpScreen2RGB() in gif2rgb.c:298:45.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/verf1sh/Poc/blob/master/giflib_poc)
2. [](https://github.com/verf1sh/Poc/blob/master/asan_report_giflib.png)
3. [](https://sourceforge.net/p/giflib/bugs/159/)
4. [FEDORA-2022-964883b2a5](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4CJSHXBD2RS5OJNWSHQZVMTQCCTIPYS/)
5. [FEDORA-2022-91f353b8be](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEAFUZXOOJJVFYRQM6IIJ7LMLEKCCESG/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-1826, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-1826 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-1826
- **State**: PUBLISHED
- **Published Date**: February 23, 2024 at 17:00 UTC
- **Last Updated**: August 27, 2024 at 14:18 UTC
- **Reserved Date**: February 23, 2024 at 10:33 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability has been found in code-projects Library System 1.0 and classified as critical. This vulnerability affects unknown code of the file Source/librarian/user/student/login.php. The manipulation of the argument username/password leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-254614 is the identifier assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**code-projects - Library System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-254614 | code-projects Library System login.php sql injection](https://vuldb.com/?id.254614)
2. [VDB-254614 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.254614)
3. [](https://github.com/jxp98/VulResearch/blob/main/2024/02/3Library%20System%20In%20PHP%20-%20SQL%20Injection-student_login.md)
### Credits
- jxp. (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-0864, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-0864 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-0864
- **State**: PUBLISHED
- **Published Date**: May 02, 2013 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 18:38 UTC
- **Reserved Date**: January 19, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2012:0531](http://rhn.redhat.com/errata/RHSA-2012-0531.html)
2. [52201](http://www.securityfocus.com/bid/52201)
3. [RHSA-2012:0393](http://rhn.redhat.com/errata/RHSA-2012-0393.html)
4. [RHSA-2012:0397](http://rhn.redhat.com/errata/RHSA-2012-0397.html)
5. [](http://sourceware.org/git/?p=glibc.git%3Ba=commitdiff%3Bh=7c1f4834d398163d1ac8101e35e9c36fc3176e6e)
6. [RHSA-2012:0488](http://rhn.redhat.com/errata/RHSA-2012-0488.html)
7. [[libc-alpha] 20120202 [PATCH] vfprintf: validate nargs and positional offsets](http://sourceware.org/ml/libc-alpha/2012-02/msg00023.html)
8. [](https://bugzilla.redhat.com/show_bug.cgi?id=794766)
9. [](http://www.phrack.org/issues.html?issue=67&id=9#article) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-3575, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-3575 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-3575
- **State**: PUBLISHED
- **Published Date**: July 21, 2016 at 10:00 UTC
- **Last Updated**: October 11, 2024 at 20:43 UTC
- **Reserved Date**: March 17, 2016 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Outside In Technology component in Oracle Fusion Middleware 8.5.0, 8.5.1, and 8.5.2 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Outside In Filters, a different vulnerability than CVE-2016-3574, CVE-2016-3576, CVE-2016-3577, CVE-2016-3578, CVE-2016-3579, CVE-2016-3580, CVE-2016-3581, CVE-2016-3582, CVE-2016-3583, CVE-2016-3590, CVE-2016-3591, CVE-2016-3592, CVE-2016-3593, CVE-2016-3594, CVE-2016-3595, and CVE-2016-3596.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21988009)
2. [](http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html)
3. [91787](http://www.securityfocus.com/bid/91787)
4. [](http://www-01.ibm.com/support/docview.wss?uid=swg21988718)
5. [1036370](http://www.securitytracker.com/id/1036370)
6. [91921](http://www.securityfocus.com/bid/91921) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-2537, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-2537 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-2537
- **State**: PUBLISHED
- **Published Date**: January 15, 2020 at 16:33 UTC
- **Last Updated**: September 30, 2024 at 17:27 UTC
- **Reserved Date**: December 10, 2019 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Fusion Middleware (component: Analytics Actions). Supported versions that are affected are 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Business Intelligence Enterprise Edition, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Business Intelligence Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Business Intelligence Enterprise Edition accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Business Intelligence Enterprise Edition. CVSS 3.0 Base Score 7.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L).
### Affected Products
**Oracle Corporation - Oracle Business Intelligence Enterprise Edition**
Affected versions:
- 12.2.1.3.0 (Status: affected)
- 12.2.1.4.0 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujan2020.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-6415, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-6415 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-6415
- **State**: PUBLISHED
- **Published Date**: March 02, 2017 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 15:25 UTC
- **Reserved Date**: March 01, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The dex_parse_debug_item function in libr/bin/p/bin_dex.c in radare2 1.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DEX file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [96523](http://www.securityfocus.com/bid/96523)
2. [](https://github.com/radare/radare2/issues/6872)
3. [](https://github.com/radareorg/radare2/commit/68338b71a563b24e62617bb629059adc0c94b230) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-51714, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-51714 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-51714
- **State**: PUBLISHED
- **Published Date**: November 09, 2024 at 11:58 UTC
- **Last Updated**: November 09, 2024 at 15:46 UTC
- **Reserved Date**: October 30, 2024 at 15:06 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Syed Umair Hussain Shah User Password Reset allows Reflected XSS.This issue affects User Password Reset: from n/a through 1.0.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Syed Umair Hussain Shah - User Password Reset**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/user-password-reset/wordpress-user-password-reset-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- SOPROBRO (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-4483, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-4483 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4483
- **State**: PUBLISHED
- **Published Date**: August 22, 2007 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 14:53 UTC
- **Reserved Date**: August 22, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in index.php in the WordPress Classic 1.5 theme in WordPress before 2.1.3 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO (PHP_SELF).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20070821 Vulnerabilities digest](http://www.securityfocus.com/archive/1/477253/100/0/threaded)
2. [](http://websecurity.com.ua/1234/)
3. [38450](http://osvdb.org/38450)
4. [](http://securityvulns.ru/Rdocument751.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-36518, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-36518 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-36518
- **State**: PUBLISHED
- **Published Date**: August 25, 2022 at 13:58 UTC
- **Last Updated**: August 03, 2024 at 10:07 UTC
- **Reserved Date**: July 25, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a stack overflow via the function EditWlanMacList.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Darry-lang1/vuln/tree/main/H3C/GR-1200W/8) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-15848, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-15848 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-15848
- **State**: PUBLISHED
- **Published Date**: August 25, 2018 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 10:01 UTC
- **Reserved Date**: August 24, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in portfolioCMS 1.0.5. There is CSRF to create new pages via admin/portfolio.php?newpage=true.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Westbrookadmin/portfolioCMS/issues/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-5654, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-5654 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-5654
- **State**: PUBLISHED
- **Published Date**: June 05, 2025 at 11:00 UTC
- **Last Updated**: June 05, 2025 at 14:51 UTC
- **Reserved Date**: June 04, 2025 at 12:42 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in PHPGurukul Complaint Management System 2.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/edit-state.php. The manipulation of the argument description leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**PHPGurukul - Complaint Management System**
Affected versions:
- 2.0 (Status: affected)
### References
1. [VDB-311144 | PHPGurukul Complaint Management System edit-state.php sql injection](https://vuldb.com/?id.311144)
2. [VDB-311144 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.311144)
3. [Submit #589965 | PHPGurukul Complaint Management System 2.0 SQL Injection](https://vuldb.com/?submit.589965)
4. [](https://github.com/f1rstb100d/myCVE/issues/43)
5. [](https://phpgurukul.com/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-48064, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-48064 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-48064
- **State**: PUBLISHED
- **Published Date**: May 21, 2025 at 17:40 UTC
- **Last Updated**: May 21, 2025 at 18:18 UTC
- **Reserved Date**: May 15, 2025 at 16:06 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
GitHub Desktop is an open-source, Electron-based GitHub app designed for git development. Prior to version 3.4.20-beta3, an attacker convincing a user to view a file in a commit of their making in the history view can cause information disclosure by means of Git attempting to access a network share. This affects GitHub Desktop users on Windows that view malicious commits in the history view. macOS users are not affected. When viewing a file diff in the history view GitHub Desktop will call `git log` or `git diff` with the object id (SHA) of the commit, the name of the file, and the old name of the file if the file has been renamed. As a security precaution Git will attempt to fully resolve the old and new path via `realpath`, traversing symlinks, to ensure that the resolved paths reside within the repository working directory. This can lead to Git attempting to access a path that resides on a network share (UNC path) and in doing so Windows will attempt to perform NTLM authentication which passes information such as the computer name, the currently signed in (Windows) user name, and an NTLM hash. GitHub Desktop 3.4.20 and later fix this vulnerability. The beta channel includes the fix in 3.4.20-beta3. As a workaround to use until upgrading is possible, only browse commits in the history view that comes from trusted sources.
### CVSS Metrics
- **CVSS Base Score**: 3.3/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**desktop - desktop**
Affected versions:
- < 3.4.20-beta3 (Status: affected)
### References
1. [https://github.com/desktop/desktop/security/advisories/GHSA-f234-7hj3-vr8j](https://github.com/desktop/desktop/security/advisories/GHSA-f234-7hj3-vr8j) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-1776, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-1776 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-1776
- **State**: PUBLISHED
- **Published Date**: March 19, 2012 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 19:08 UTC
- **Reserved Date**: March 19, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple heap-based buffer overflows in VideoLAN VLC media player before 2.0.1 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Real RTSP stream.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.videolan.org/security/sa1202.html)
2. [52550](http://www.securityfocus.com/bid/52550)
3. [80189](http://osvdb.org/80189)
4. [oval:org.mitre.oval:def:14817](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14817)
5. [vlcmediaplayer-realrtsp-bo(74118)](https://exchange.xforce.ibmcloud.com/vulnerabilities/74118) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-0245, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-0245 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0245
- **State**: PUBLISHED
- **Published Date**: May 02, 2018 at 22:00 UTC
- **Last Updated**: November 29, 2024 at 15:13 UTC
- **Reserved Date**: November 27, 2017 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the REST API of Cisco 5500 and 8500 Series Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to view system information that under normal circumstances should be prohibited. The vulnerability is due to incomplete input and validation checking mechanisms in the REST API URL request. An attacker could exploit this vulnerability by sending a malicious URL to the REST API. If successful, an exploit could allow the attacker to view sensitive system information. Cisco Bug IDs: CSCvg89442.
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**n/a - Cisco 5500 and 8500 Series Wireless LAN Controller**
Affected versions:
- Cisco 5500 and 8500 Series Wireless LAN Controller (Status: affected)
### References
1. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-wlc-id)
2. [104123](http://www.securityfocus.com/bid/104123)
3. [1040823](http://www.securitytracker.com/id/1040823) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-0734, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-0734 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0734
- **State**: PUBLISHED
- **Published Date**: January 19, 2024 at 20:31 UTC
- **Last Updated**: May 30, 2025 at 14:25 UTC
- **Reserved Date**: January 19, 2024 at 11:25 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Smsot up to 2.12. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /get.php. The manipulation of the argument tid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-251557 was assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**n/a - Smsot**
Affected versions:
- 2.0 (Status: affected)
- 2.1 (Status: affected)
- 2.2 (Status: affected)
- 2.3 (Status: affected)
- 2.4 (Status: affected)
- 2.5 (Status: affected)
- 2.6 (Status: affected)
- 2.7 (Status: affected)
- 2.8 (Status: affected)
- 2.9 (Status: affected)
- 2.10 (Status: affected)
- 2.11 (Status: affected)
- 2.12 (Status: affected)
### References
1. [](https://vuldb.com/?id.251557)
2. [](https://vuldb.com/?ctiid.251557)
3. [](https://note.zhaoj.in/share/vo1KOw3EYmBK)
### Credits
- glzjin (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-21587, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-21587 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21587
- **State**: PUBLISHED
- **Published Date**: July 15, 2021 at 16:15 UTC
- **Last Updated**: September 16, 2024 at 17:48 UTC
- **Reserved Date**: January 04, 2021 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
Dell Wyse Management Suite versions 3.2 and earlier contain a full path disclosure vulnerability. A local unauthenticated attacker could exploit this vulnerability in order to obtain the path of files and folders.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**Dell - Wyse Management Suite**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.dell.com/support/kbdoc/000189363) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-52758, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-52758 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-52758
- **State**: REJECTED
- **Published Date**: May 21, 2024 at 15:30 UTC
- **Last Updated**: May 24, 2024 at 15:27 UTC
- **Reserved Date**: May 21, 2024 at 15:19 UTC
- **Assigned By**: Linux
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-4616, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-4616 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-4616
- **State**: PUBLISHED
- **Published Date**: June 18, 2013 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 16:52 UTC
- **Reserved Date**: June 18, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The WifiPasswordController generateDefaultPassword method in Preferences in Apple iOS 6 and earlier relies on the UITextChecker suggestWordInLanguage method for selection of Wi-Fi hotspot WPA2 PSK passphrases, which makes it easier for remote attackers to obtain access via a brute-force attack that leverages the insufficient number of possible passphrases.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[owasp-mobile-security-project] 20130617 Cracking iOS personal hotspots using a Scrabble crossword game word list](http://lists.owasp.org/pipermail/owasp-mobile-security-project/2013-June/000640.html)
2. [1029054](http://www.securitytracker.com/id/1029054)
3. [](http://www1.cs.fau.de/hotspot)
4. [54886](http://secunia.com/advisories/54886)
5. [](http://support.apple.com/kb/HT5934)
6. [](http://www1.cs.fau.de/filepool/projects/hotspot/hotspot.pdf)
7. [APPLE-SA-2013-09-18-2](http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-5325, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-5325 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5325
- **State**: REJECTED
- **Last Updated**: January 06, 2023 at 15:14 UTC
- **Reserved Date**: January 04, 2019 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-14662, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-14662 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14662
- **State**: PUBLISHED
- **Published Date**: July 15, 2020 at 17:34 UTC
- **Last Updated**: September 27, 2024 at 18:25 UTC
- **Reserved Date**: June 19, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 8.0.6-8.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Financial Services Analytical Applications Infrastructure. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Financial Services Analytical Applications Infrastructure accessible data as well as unauthorized read access to a subset of Oracle Financial Services Analytical Applications Infrastructure accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Financial Services Analytical Applications Infrastructure. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Affected Products
**Oracle Corporation - Financial Services Analytical Applications Infrastructure**
Affected versions:
- 8.0.6-8.1.0 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujul2020.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-3346, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-3346 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3346
- **State**: PUBLISHED
- **Published Date**: June 22, 2007 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 14:14 UTC
- **Reserved Date**: June 22, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in index.php in PHPAccounts 0.5 allows remote attackers to include arbitrary local files via unspecified manipulations of the page parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://pridels-team.blogspot.com/2007/06/phpaccounts-vuln.html)
2. [24572](http://www.securityfocus.com/bid/24572)
3. [phpaccounts-index-file-include(35027)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35027)
4. [37683](http://osvdb.org/37683) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-2278, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-2278 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2278
- **State**: REJECTED
- **Published Date**: January 22, 2019 at 20:00 UTC
- **Last Updated**: January 22, 2019 at 17:57 UTC
- **Reserved Date**: December 13, 2017 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-6226, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-6226 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-6226
- **State**: PUBLISHED
- **Published Date**: December 02, 2006 at 02:00 UTC
- **Last Updated**: September 17, 2024 at 02:42 UTC
- **Reserved Date**: December 01, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple format string vulnerabilities in NeoEngine 0.8.2 and earlier, and CVS 3422, allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) Console::Render in neoengine/console.cpp and (2) TextArea::Render in neowtk/textarea.cpp.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://aluigi.altervista.org/adv/neoenginex-adv.txt)
2. [18696](http://www.securityfocus.com/bid/18696)
3. [27926](http://www.osvdb.org/27926)
4. [](http://www.securiteam.com/securitynews/5MP0N2AIUC.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-2709, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-2709 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-2709
- **State**: PUBLISHED
- **Published Date**: March 20, 2024 at 17:31 UTC
- **Last Updated**: August 01, 2024 at 19:18 UTC
- **Reserved Date**: March 20, 2024 at 09:51 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Tenda AC10U 15.03.06.49. It has been classified as critical. Affected is the function fromSetRouteStatic of the file /goform/SetStaticRouteCfg. The manipulation of the argument list leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257460. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Tenda - AC10U**
Affected versions:
- 15.03.06.49 (Status: affected)
### References
1. [VDB-257460 | Tenda AC10U SetStaticRouteCfg fromSetRouteStatic stack-based overflow](https://vuldb.com/?id.257460)
2. [VDB-257460 | CTI Indicators (IOB, IOC, IOA)](https://vuldb.com/?ctiid.257460)
3. [](https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.49/more/fromSetRouteStatic.md)
### Credits
- yhryhryhr_mie (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-50765, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-50765 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-50765
- **State**: PUBLISHED
- **Published Date**: December 13, 2023 at 17:30 UTC
- **Last Updated**: February 13, 2025 at 17:19 UTC
- **Reserved Date**: December 13, 2023 at 13:06 UTC
- **Assigned By**: jenkins
### Vulnerability Description
A missing permission check in Jenkins Scriptler Plugin 342.v6a_89fd40f466 and earlier allows attackers with Overall/Read permission to read the contents of a Groovy script by knowing its ID.
### Affected Products
**Jenkins Project - Jenkins Scriptler Plugin**
Affected versions:
- 0 (Status: affected)
### References
1. [Jenkins Security Advisory 2023-12-13](https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-3206)
2. [](http://www.openwall.com/lists/oss-security/2023/12/13/4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-53729, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-53729 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-53729
- **State**: PUBLISHED
- **Published Date**: December 02, 2024 at 13:48 UTC
- **Last Updated**: December 02, 2024 at 15:40 UTC
- **Reserved Date**: November 22, 2024 at 13:51 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Plumeria Web Design Blizzard Quotes allows Stored XSS.This issue affects Blizzard Quotes: from n/a through 1.3.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Plumeria Web Design - Blizzard Quotes**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/blizzard-quotes/vulnerability/wordpress-blizzard-quotes-plugin-1-3-csrf-to-stored-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- SOPROBRO (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-49015, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-49015 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-49015
- **State**: PUBLISHED
- **Published Date**: October 21, 2024 at 20:06 UTC
- **Last Updated**: May 04, 2025 at 08:28 UTC
- **Reserved Date**: August 22, 2024 at 01:27 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
net: hsr: Fix potential use-after-free
The skb is delivered to netif_rx() which may free it, after calling this,
dereferencing skb may trigger use-after-free.
### Affected Products
**Linux - Linux**
Affected versions:
- f421436a591d34fa5279b54a96ac07d70250cc8d (Status: affected)
- f421436a591d34fa5279b54a96ac07d70250cc8d (Status: affected)
- f421436a591d34fa5279b54a96ac07d70250cc8d (Status: affected)
- f421436a591d34fa5279b54a96ac07d70250cc8d (Status: affected)
- f421436a591d34fa5279b54a96ac07d70250cc8d (Status: affected)
- f421436a591d34fa5279b54a96ac07d70250cc8d (Status: affected)
- f421436a591d34fa5279b54a96ac07d70250cc8d (Status: affected)
- f421436a591d34fa5279b54a96ac07d70250cc8d (Status: affected)
**Linux - Linux**
Affected versions:
- 3.13 (Status: affected)
- 0 (Status: unaffected)
- 4.9.335 (Status: unaffected)
- 4.14.301 (Status: unaffected)
- 4.19.268 (Status: unaffected)
- 5.4.226 (Status: unaffected)
- 5.10.158 (Status: unaffected)
- 5.15.82 (Status: unaffected)
- 6.0.12 (Status: unaffected)
- 6.1 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/8393ce5040803666bfa26a3a7bf41e44fab0ace9)
2. [](https://git.kernel.org/stable/c/4b351609af4fdbc23f79ab2b12748f4403ea9af4)
3. [](https://git.kernel.org/stable/c/b35d899854d5d5d58eb7d7e7c0f61afc60d3a9e9)
4. [](https://git.kernel.org/stable/c/53a62c5efe91665f7a41fad0f888a96f94dc59eb)
5. [](https://git.kernel.org/stable/c/7ca81a161e406834a1fdc405fc83a572bd14b8d9)
6. [](https://git.kernel.org/stable/c/dca370e575d9b6c983f5015e8dc035e23e219ee6)
7. [](https://git.kernel.org/stable/c/f3add2b8cf620966de3ebfa07679ca12d33ec26f)
8. [](https://git.kernel.org/stable/c/7e177d32442b7ed08a9fa61b61724abc548cb248) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-2191, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-2191 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-2191
- **State**: PUBLISHED
- **Published Date**: March 11, 2025 at 12:00 UTC
- **Last Updated**: March 11, 2025 at 13:14 UTC
- **Reserved Date**: March 11, 2025 at 06:50 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as problematic, has been found in Claro A7600-A1 RNR4-A72T-2x16_v2110403_CLA_32_160817. Affected by this issue is some unknown functionality of the file /form2pingv6.cgi of the component Ping6 Diagnóstico. The manipulation of the argument ip6addr with the input <img/src/onerror=prompt(8)> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 2.4/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
- CWE-94: Code Injection
### Affected Products
**Claro - A7600-A1**
Affected versions:
- RNR4-A72T-2x16_v2110403_CLA_32_160817 (Status: affected)
### References
1. [VDB-299216 | Claro A7600-A1 Ping6 Diagnóstico form2pingv6.cgi cross site scripting](https://vuldb.com/?id.299216)
2. [VDB-299216 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.299216)
3. [Submit #511700 | Claro A7600-A1 Wlan Router RNR4-A72T-2x16_v2110403_CLA_32_160817 Cross Site Scripting](https://vuldb.com/?submit.511700)
### Credits
- Havook (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-7580, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-7580 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-7580
- **State**: PUBLISHED
- **Published Date**: December 21, 2020 at 20:33 UTC
- **Last Updated**: August 05, 2024 at 06:31 UTC
- **Reserved Date**: March 01, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Philips Hue is vulnerable to a Denial of Service attack. Sending a SYN flood on port tcp/80 will freeze Philips Hue's hub and it will stop responding. The "hub" will stop operating and be frozen until the flood stops. During the flood, the user won't be able to turn on/off the lights, and all of the hub's functionality will be unresponsive. The cloud service also won't work with the hub.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.iliashn.com/CVE-2018-7580/)
2. [20201225 [CVE-2018-7580] - Philips Hue Denial of Service](http://seclists.org/fulldisclosure/2020/Dec/51)
3. [](http://packetstormsecurity.com/files/160724/Philips-Hue-Denial-Of-Service.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-11009, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-11009 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-11009
- **State**: PUBLISHED
- **Published Date**: April 08, 2019 at 18:18 UTC
- **Last Updated**: August 04, 2024 at 22:40 UTC
- **Reserved Date**: April 08, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a heap-based buffer over-read in the function ReadXWDImage of coders/xwd.c, which allows attackers to cause a denial of service or information disclosure via a crafted image file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sourceforge.net/p/graphicsmagick/bugs/597/)
2. [](http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/7cff2b1792de)
3. [[debian-lts-announce] 20190413 [SECURITY] [DLA 1755-1] graphicsmagick security update](https://lists.debian.org/debian-lts-announce/2019/04/msg00015.html)
4. [openSUSE-SU-2019:1272](http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html)
5. [openSUSE-SU-2019:1295](http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html)
6. [openSUSE-SU-2019:1320](http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html)
7. [openSUSE-SU-2019:1355](http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00021.html)
8. [openSUSE-SU-2019:1354](http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00020.html)
9. [openSUSE-SU-2019:1437](http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00055.html)
10. [USN-4207-1](https://usn.ubuntu.com/4207-1/)
11. [DSA-4640](https://www.debian.org/security/2020/dsa-4640) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-32291, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-32291 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-32291
- **State**: PUBLISHED
- **Published Date**: June 09, 2025 at 15:54 UTC
- **Last Updated**: June 09, 2025 at 16:02 UTC
- **Reserved Date**: April 04, 2025 at 10:02 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Unrestricted Upload of File with Dangerous Type vulnerability in FantasticPlugins SUMO Affiliates Pro allows Using Malicious Files. This issue affects SUMO Affiliates Pro: from n/a through 10.7.0.
### CVSS Metrics
- **CVSS Base Score**: 10/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**FantasticPlugins - SUMO Affiliates Pro**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/affs/vulnerability/wordpress-sumo-affiliates-pro-10-7-0-arbitrary-file-upload-vulnerability?_s_id=cve)
### Credits
- Anhchangmutrang (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-17875, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-17875 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-17875
- **State**: PUBLISHED
- **Published Date**: December 28, 2021 at 12:28 UTC
- **Last Updated**: August 05, 2024 at 11:01 UTC
- **Reserved Date**: October 01, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A remote code execution issue in the ping command on Poly Trio 8800 5.7.1.4145 devices allows remote authenticated users to execute commands via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.polycom.com/content/support/emea/emea/en/support/voice/polycom-trio/polycom-trio-8800.html)
2. [](http://unkl4b.github.io/Authenticated-RCE-in-Polycom-Trio-8800-pt-1/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-25665, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-25665 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25665
- **State**: PUBLISHED
- **Published Date**: March 24, 2023 at 23:39 UTC
- **Last Updated**: February 19, 2025 at 20:31 UTC
- **Reserved Date**: February 09, 2023 at 20:58 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, when `SparseSparseMaximum` is given invalid sparse tensors as inputs, it can give a null pointer error. A fix is included in TensorFlow version 2.12 and version 2.11.1.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-476: NULL Pointer Dereference
### Affected Products
**tensorflow - tensorflow**
Affected versions:
- < 2.11.1 (Status: affected)
### References
1. [https://github.com/tensorflow/tensorflow/security/advisories/GHSA-558h-mq8x-7q9g](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-558h-mq8x-7q9g)
2. [https://github.com/tensorflow/tensorflow/commit/5e0ecfb42f5f65629fd7a4edd6c4afe7ff0feb04](https://github.com/tensorflow/tensorflow/commit/5e0ecfb42f5f65629fd7a4edd6c4afe7ff0feb04) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-39925, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-39925 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-39925
- **State**: PUBLISHED
- **Published Date**: September 13, 2024 at 00:00 UTC
- **Last Updated**: March 22, 2025 at 13:36 UTC
- **Reserved Date**: July 03, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Vaultwarden (formerly Bitwarden_RS) 1.30.3. It lacks an offboarding process for members who leave an organization. As a result, the shared organization key is not rotated when a member departs. Consequently, the departing member, whose access should be revoked, retains a copy of the organization key. Additionally, the application fails to adequately protect some encrypted data stored on the server. Consequently, an authenticated user could gain unauthorized access to encrypted data of any organization, even if the user is not a member of the targeted organization. However, the user would need to know the corresponding organizationId. Hence, if a user (whose access to an organization has been revoked) already possesses the organization key, that user could use the key to decrypt the leaked data.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/dani-garcia/vaultwarden/releases)
2. [](https://github.com/dani-garcia/vaultwarden/releases/tag/1.32.0)
3. [](https://www.mgm-sp.com/cve/missing-rotation-of-the-organization-key) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-41425, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-41425 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-41425
- **State**: PUBLISHED
- **Published Date**: October 03, 2022 at 13:51 UTC
- **Last Updated**: August 03, 2024 at 12:42 UTC
- **Reserved Date**: September 26, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Bento4 v1.6.0-639 was discovered to contain a segmentation violation via the AP4_Processor::ProcessFragments function in mp4decrypt.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/axiomatic-systems/Bento4/issues/772) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-4643, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-4643 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4643
- **State**: PUBLISHED
- **Published Date**: January 28, 2011 at 21:13 UTC
- **Last Updated**: August 07, 2024 at 03:51 UTC
- **Reserved Date**: January 03, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Heap-based buffer overflow in Impress in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Truevision TGA (TARGA) file in an ODF or Microsoft Office document.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [40775](http://secunia.com/advisories/40775)
2. [46031](http://www.securityfocus.com/bid/46031)
3. [DSA-2151](http://www.debian.org/security/2011/dsa-2151)
4. [60799](http://secunia.com/advisories/60799)
5. [](http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html)
6. [GLSA-201408-19](http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml)
7. [43118](http://secunia.com/advisories/43118)
8. [43065](http://secunia.com/advisories/43065)
9. [ADV-2011-0230](http://www.vupen.com/english/advisories/2011/0230)
10. [1025002](http://www.securitytracker.com/id?1025002)
11. [ADV-2011-0232](http://www.vupen.com/english/advisories/2011/0232)
12. [70718](http://osvdb.org/70718)
13. [RHSA-2011:0182](http://www.redhat.com/support/errata/RHSA-2011-0182.html)
14. [](https://bugzilla.redhat.com/show_bug.cgi?id=667588)
15. [USN-1056-1](http://ubuntu.com/usn/usn-1056-1)
16. [RHSA-2011:0181](http://www.redhat.com/support/errata/RHSA-2011-0181.html)
17. [ADV-2011-0279](http://www.vupen.com/english/advisories/2011/0279)
18. [ooo-tga-bo(65441)](https://exchange.xforce.ibmcloud.com/vulnerabilities/65441)
19. [43105](http://secunia.com/advisories/43105)
20. [MDVSA-2011:027](http://www.mandriva.com/security/advisories?name=MDVSA-2011:027)
21. [42999](http://secunia.com/advisories/42999)
22. [](http://www.openoffice.org/security/cves/CVE-2010-4643.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-26629, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-26629 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-26629
- **State**: PUBLISHED
- **Published Date**: March 13, 2024 at 14:01 UTC
- **Last Updated**: May 04, 2025 at 12:54 UTC
- **Reserved Date**: February 19, 2024 at 14:20 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
nfsd: fix RELEASE_LOCKOWNER
The test on so_count in nfsd4_release_lockowner() is nonsense and
harmful. Revert to using check_for_locks(), changing that to not sleep.
First: harmful.
As is documented in the kdoc comment for nfsd4_release_lockowner(), the
test on so_count can transiently return a false positive resulting in a
return of NFS4ERR_LOCKS_HELD when in fact no locks are held. This is
clearly a protocol violation and with the Linux NFS client it can cause
incorrect behaviour.
If RELEASE_LOCKOWNER is sent while some other thread is still
processing a LOCK request which failed because, at the time that request
was received, the given owner held a conflicting lock, then the nfsd
thread processing that LOCK request can hold a reference (conflock) to
the lock owner that causes nfsd4_release_lockowner() to return an
incorrect error.
The Linux NFS client ignores that NFS4ERR_LOCKS_HELD error because it
never sends NFS4_RELEASE_LOCKOWNER without first releasing any locks, so
it knows that the error is impossible. It assumes the lock owner was in
fact released so it feels free to use the same lock owner identifier in
some later locking request.
When it does reuse a lock owner identifier for which a previous RELEASE
failed, it will naturally use a lock_seqid of zero. However the server,
which didn't release the lock owner, will expect a larger lock_seqid and
so will respond with NFS4ERR_BAD_SEQID.
So clearly it is harmful to allow a false positive, which testing
so_count allows.
The test is nonsense because ... well... it doesn't mean anything.
so_count is the sum of three different counts.
1/ the set of states listed on so_stateids
2/ the set of active vfs locks owned by any of those states
3/ various transient counts such as for conflicting locks.
When it is tested against '2' it is clear that one of these is the
transient reference obtained by find_lockowner_str_locked(). It is not
clear what the other one is expected to be.
In practice, the count is often 2 because there is precisely one state
on so_stateids. If there were more, this would fail.
In my testing I see two circumstances when RELEASE_LOCKOWNER is called.
In one case, CLOSE is called before RELEASE_LOCKOWNER. That results in
all the lock states being removed, and so the lockowner being discarded
(it is removed when there are no more references which usually happens
when the lock state is discarded). When nfsd4_release_lockowner() finds
that the lock owner doesn't exist, it returns success.
The other case shows an so_count of '2' and precisely one state listed
in so_stateid. It appears that the Linux client uses a separate lock
owner for each file resulting in one lock state per lock owner, so this
test on '2' is safe. For another client it might not be safe.
So this patch changes check_for_locks() to use the (newish)
find_any_file_locked() so that it doesn't take a reference on the
nfs4_file and so never calls nfsd_file_put(), and so never sleeps. With
this check is it safe to restore the use of check_for_locks() rather
than testing so_count against the mysterious '2'.
### Affected Products
**Linux - Linux**
Affected versions:
- 3097f38e91266c7132c3fdb7e778fac858c00670 (Status: affected)
- e2fc17fcc503cfca57b5d1dd3b646ca7eebead97 (Status: affected)
- ce3c4ad7f4ce5db7b4f08a1e237d8dd94b39180b (Status: affected)
- ce3c4ad7f4ce5db7b4f08a1e237d8dd94b39180b (Status: affected)
- ce3c4ad7f4ce5db7b4f08a1e237d8dd94b39180b (Status: affected)
- ce3c4ad7f4ce5db7b4f08a1e237d8dd94b39180b (Status: affected)
- fea1d0940301378206955264a01778700fc9c16f (Status: affected)
- 2ec65dc6635d1976bd1dbf2640ff7f810b2f6dd1 (Status: affected)
- a2235bc65ade40982c3d09025cdd34bc539d6a69 (Status: affected)
- ba747abfca27e23c42ded3912c87b70d7e16b6ab (Status: affected)
- e8020d96dd5b2dcc1f6a8ee4f87a53a373002cd5 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.19 (Status: affected)
- 0 (Status: unaffected)
- 5.10.220 (Status: unaffected)
- 5.15.154 (Status: unaffected)
- 6.1.79 (Status: unaffected)
- 6.6.15 (Status: unaffected)
- 6.7.3 (Status: unaffected)
- 6.8 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/99fb654d01dc3f08b5905c663ad6c89a9d83302f)
2. [](https://git.kernel.org/stable/c/c6f8b3fcc62725e4129f2c0fd550d022d4a7685a)
3. [](https://git.kernel.org/stable/c/e4cf8941664cae2f89f0189c29fe2ce8c6be0d03)
4. [](https://git.kernel.org/stable/c/b7d2eee1f53899b53f069bba3a59a419fc3d331b)
5. [](https://git.kernel.org/stable/c/8f5b860de87039b007e84a28a5eefc888154e098)
6. [](https://git.kernel.org/stable/c/edcf9725150e42beeca42d085149f4c88fa97afd) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-1723, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-1723 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-1723
- **State**: PUBLISHED
- **Published Date**: April 19, 2011 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 22:37 UTC
- **Reserved Date**: April 19, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in app/views/layouts/base.rhtml in Redmine 1.0.1 through 1.1.1 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to projects/hg-helloworld/news/. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [47193](http://www.securityfocus.com/bid/47193)
2. [43999](http://secunia.com/advisories/43999)
3. [20110406 XSS Vulnerability in Redmine 1.0.1 to 1.1.1](http://www.securityfocus.com/archive/1/517355/100/0/threaded)
4. [ADV-2011-0895](http://www.vupen.com/english/advisories/2011/0895)
5. [8211](http://securityreason.com/securityalert/8211)
6. [71564](http://osvdb.org/71564)
7. [](http://www.redmine.org/news/53)
8. [](http://www.mavitunasecurity.com/XSS-vulnerability-in-Redmine/)
9. [redmine-base-xss(66612)](https://exchange.xforce.ibmcloud.com/vulnerabilities/66612) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-43418, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-43418 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-43418
- **State**: PUBLISHED
- **Published Date**: October 19, 2022 at 00:00 UTC
- **Last Updated**: May 08, 2025 at 19:09 UTC
- **Reserved Date**: October 18, 2022 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
A cross-site request forgery (CSRF) vulnerability in Jenkins Katalon Plugin 1.0.33 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
### Affected Products
**Jenkins project - Jenkins Katalon Plugin**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2845%20%282%29)
2. [[oss-security] 20221019 Multiple vulnerabilities in Jenkins plugins](http://www.openwall.com/lists/oss-security/2022/10/19/3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-38954, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-38954 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-38954
- **State**: PUBLISHED
- **Published Date**: August 03, 2023 at 00:00 UTC
- **Last Updated**: October 17, 2024 at 19:38 UTC
- **Reserved Date**: July 25, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ZKTeco BioAccess IVS v3.3.1 was discovered to contain a SQL injection vulnerability.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://zkteco.com)
2. [](https://claroty.com/team82/disclosure-dashboard/cve-2023-38954) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-3186, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-3186 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-3186
- **State**: PUBLISHED
- **Published Date**: August 30, 2010 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 03:03 UTC
- **Reserved Date**: August 30, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
IBM WebSphere Application Server (WAS) 7.x before 7.0.0.13, and WebSphere Application Server Feature Pack for Web Services 6.1.0.9 through 6.1.0.32, when a JAX-WS application is used, does not properly handle an IncludeTimestamp setting in the WS-Security policy, which has unspecified impact and remote attack vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [PM08360](http://www-01.ibm.com/support/docview.wss?uid=swg1PM08360)
2. [67570](http://osvdb.org/67570)
3. [PM16014](http://www-01.ibm.com/support/docview.wss?uid=swg1PM16014)
4. [](http://www-01.ibm.com/support/docview.wss?uid=swg24027709)
5. [41173](http://secunia.com/advisories/41173)
6. [websphere-timestamp-unspecified(61435)](https://exchange.xforce.ibmcloud.com/vulnerabilities/61435)
7. [ADV-2010-2215](http://www.vupen.com/english/advisories/2010/2215)
8. [](http://www-01.ibm.com/support/docview.wss?uid=swg21443736)
9. [](http://www-01.ibm.com/support/docview.wss?uid=swg24027708) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-8304, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-8304 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8304
- **State**: PUBLISHED
- **Published Date**: August 29, 2024 at 14:31 UTC
- **Last Updated**: August 29, 2024 at 15:43 UTC
- **Reserved Date**: August 29, 2024 at 07:31 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability has been found in jpress up to 5.1.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/template/edit of the component Template Module Handler. The manipulation leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 4.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**n/a - jpress**
Affected versions:
- 5.1.0 (Status: affected)
- 5.1.1 (Status: affected)
### References
1. [VDB-276079 | jpress Template Module edit path traversal](https://vuldb.com/?id.276079)
2. [VDB-276079 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.276079)
3. [Submit #396425 | https://github.com/JPressProjects jpress ≤v5.1.1 path](https://vuldb.com/?submit.396425)
4. [](https://github.com/JPressProjects/jpress/issues/189)
### Credits
- microvorld (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-25906, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-25906 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-25906
- **State**: PUBLISHED
- **Published Date**: May 17, 2024 at 08:22 UTC
- **Last Updated**: August 01, 2024 at 23:52 UTC
- **Reserved Date**: February 12, 2024 at 08:34 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Authentication Bypass by Spoofing vulnerability in WP Happy Coders Comments Like Dislike allows Functionality Bypass.This issue affects Comments Like Dislike: from n/a through 1.2.2.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-290: Security Weakness
### Affected Products
**WP Happy Coders - Comments Like Dislike**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/comments-like-dislike/wordpress-comments-like-dislike-plugin-1-2-1-ip-restriction-bypass-vulnerability-vulnerability?_s_id=cve)
### Credits
- Mika (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-44376, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-44376 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-44376
- **State**: REJECTED
- **Published Date**: October 27, 2023 at 12:15 UTC
- **Last Updated**: January 02, 2024 at 19:12 UTC
- **Reserved Date**: September 28, 2023 at 17:27 UTC
- **Assigned By**: Fluid Attacks
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-11175, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-11175 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-11175
- **State**: PUBLISHED
- **Published Date**: July 05, 2018 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 17:57 UTC
- **Reserved Date**: July 11, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In J2 Innovations FIN Stack 4.0, the authentication webform is vulnerable to reflected XSS via the query string to /login.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/miruser/Roche-CVEs/blob/master/CVE-2017-11175.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-1110, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-1110 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-1110
- **State**: PUBLISHED
- **Published Date**: December 19, 2000 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 05:45 UTC
- **Reserved Date**: December 14, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
document.d2w CGI program in the IBM Net.Data db2www package allows remote attackers to determine the physical path of the web server by sending a nonexistent command to the program.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [2017](http://www.securityfocus.com/bid/2017)
2. [20001128 IBM Net.Data Local Path Disclosure Vulnerability?](http://archives.neohapsis.com/archives/bugtraq/2000-11/0384.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-39646, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-39646 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-39646
- **State**: PUBLISHED
- **Published Date**: October 03, 2023 at 00:00 UTC
- **Last Updated**: September 20, 2024 at 16:33 UTC
- **Reserved Date**: August 07, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Improper neutralization of SQL parameter in Theme Volty CMS Category Chain Slider module for PrestaShop. In the module “Theme Volty CMS Category Chain Slide"(tvcmscategorychainslider) up to version 4.0.1 from Theme Volty for PrestaShop, a guest can perform SQL injection in affected versions.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://security.friendsofpresta.org/modules/2023/09/26/tvcmscategorychainslider.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-9967, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-9967 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-9967
- **State**: PUBLISHED
- **Published Date**: May 17, 2018 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 07:24 UTC
- **Reserved Date**: April 10, 2018 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Format actions of TextBox objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-5571.
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Foxit - Foxit Reader**
Affected versions:
- 9.0.1.1049 (Status: affected)
### References
1. [](https://www.foxitsoftware.com/support/security-bulletins.php)
2. [](https://zerodayinitiative.com/advisories/ZDI-18-351) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-26682, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-26682 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-26682
- **State**: PUBLISHED
- **Published Date**: April 08, 2025 at 17:24 UTC
- **Last Updated**: June 04, 2025 at 17:53 UTC
- **Reserved Date**: February 12, 2025 at 22:35 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Allocation of resources without limits or throttling in ASP.NET Core allows an unauthorized attacker to deny service over a network.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-770: Security Weakness
### Affected Products
**Microsoft - ASP.NET Core 8.0**
Affected versions:
- 8.0 (Status: affected)
**Microsoft - Microsoft Visual Studio 2022 version 17.12**
Affected versions:
- 17.0 (Status: affected)
**Microsoft - Microsoft Visual Studio 2022 version 17.13**
Affected versions:
- 17.10 (Status: affected)
**Microsoft - Microsoft Visual Studio 2022 version 17.8**
Affected versions:
- 17.8.0 (Status: affected)
**Microsoft - Microsoft Visual Studio 2022 version 17.10**
Affected versions:
- 17.10 (Status: affected)
**Microsoft - ASP.NET Core 9.0**
Affected versions:
- 9.0 (Status: affected)
### References
1. [ASP.NET Core and Visual Studio Denial of Service Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26682) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-1385, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-1385 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-1385
- **State**: PUBLISHED
- **Published Date**: August 14, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 09:42 UTC
- **Reserved Date**: January 08, 2014 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
WebKit, as used in Apple Safari before 6.1.6 and 7.x before 7.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in HT6367.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [69223](http://www.securityfocus.com/bid/69223)
2. [1030731](http://www.securitytracker.com/id/1030731)
3. [](http://support.apple.com/kb/HT6441)
4. [GLSA-201601-02](https://security.gentoo.org/glsa/201601-02)
5. [](https://support.apple.com/kb/HT6537)
6. [](http://support.apple.com/kb/HT6367)
7. [](http://support.apple.com/kb/HT6442)
8. [61318](http://secunia.com/advisories/61318)
9. [APPLE-SA-2014-09-17-2](http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html)
10. [APPLE-SA-2014-09-17-1](http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html)
11. [apple-safari-cve20141385-code-exec(95268)](https://exchange.xforce.ibmcloud.com/vulnerabilities/95268)
12. [60705](http://secunia.com/advisories/60705) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-19492, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-19492 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-19492
- **State**: PUBLISHED
- **Published Date**: November 23, 2018 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 11:37 UTC
- **Reserved Date**: November 23, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in cairo.trm in Gnuplot 5.2.5. This issue allows an attacker to conduct a buffer overflow with an arbitrary amount of data in the cairotrm_options function. This flaw is caused by a missing size check of an argument passed to the "set font" function. This issue occurs when the Gnuplot pngcairo terminal is used as a backend.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sourceforge.net/p/gnuplot/gnuplot-main/ci/d5020716834582b20a5e12cdd49f39ee4f9dd949/)
2. [[debian-lts-announce] 20181126 [SECURITY] [DLA 1597-1] gnuplot security update](https://lists.debian.org/debian-lts-announce/2018/11/msg00035.html)
3. [](https://sourceforge.net/p/gnuplot/bugs/2089/)
4. [[debian-lts-announce] 20181125 [SECURITY] [DLA 1595-1] gnuplot5 security update](https://lists.debian.org/debian-lts-announce/2018/11/msg00031.html)
5. [openSUSE-SU-2019:1216](http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00066.html)
6. [USN-4541-1](https://usn.ubuntu.com/4541-1/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-32651, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-32651 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-32651
- **State**: PUBLISHED
- **Published Date**: June 01, 2021 at 17:15 UTC
- **Last Updated**: August 03, 2024 at 23:25 UTC
- **Reserved Date**: May 12, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
OneDev is a development operations platform. If the LDAP external authentication mechanism is enabled in OneDev versions 4.4.1 and prior, an attacker can manipulate a user search filter to send forged queries to the application and explore the LDAP tree using Blind LDAP Injection techniques. The specific payload depends on how the User Search Filter property is configured in OneDev. This issue was fixed in version 4.4.2.
### CVSS Metrics
- **CVSS Base Score**: 3.1/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-90: Security Weakness
### Affected Products
**theonedev - onedev**
Affected versions:
- <= 4.4.1 (Status: affected)
### References
1. [](https://github.com/theonedev/onedev/security/advisories/GHSA-5864-2496-4xjf)
2. [](https://github.com/theonedev/onedev/commit/4440f0c57e440488d7e653417b2547eaae8ad19c) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-38637, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-38637 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-38637
- **State**: PUBLISHED
- **Published Date**: June 21, 2024 at 10:18 UTC
- **Last Updated**: May 04, 2025 at 09:15 UTC
- **Reserved Date**: June 18, 2024 at 19:36 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
greybus: lights: check return of get_channel_from_mode
If channel for the given node is not found we return null from
get_channel_from_mode. Make sure we validate the return pointer
before using it in two of the missing places.
This was originally reported in [0]:
Found by Linux Verification Center (linuxtesting.org) with SVACE.
[0] https://lore.kernel.org/all/20240301190425.120605-1-m.lobanov@rosalinux.ru
### Affected Products
**Linux - Linux**
Affected versions:
- 2870b52bae4c81823ffcb3ed2b0626fb39d64f48 (Status: affected)
- 2870b52bae4c81823ffcb3ed2b0626fb39d64f48 (Status: affected)
- 2870b52bae4c81823ffcb3ed2b0626fb39d64f48 (Status: affected)
- 2870b52bae4c81823ffcb3ed2b0626fb39d64f48 (Status: affected)
- 2870b52bae4c81823ffcb3ed2b0626fb39d64f48 (Status: affected)
- 2870b52bae4c81823ffcb3ed2b0626fb39d64f48 (Status: affected)
- 2870b52bae4c81823ffcb3ed2b0626fb39d64f48 (Status: affected)
- 2870b52bae4c81823ffcb3ed2b0626fb39d64f48 (Status: affected)
**Linux - Linux**
Affected versions:
- 4.9 (Status: affected)
- 0 (Status: unaffected)
- 4.19.316 (Status: unaffected)
- 5.4.278 (Status: unaffected)
- 5.10.219 (Status: unaffected)
- 5.15.161 (Status: unaffected)
- 6.1.93 (Status: unaffected)
- 6.6.33 (Status: unaffected)
- 6.9.4 (Status: unaffected)
- 6.10 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/8f4a76d477f0cc3c54d512f07f6f88c8e1c1e07b)
2. [](https://git.kernel.org/stable/c/e2c64246e5dc8c0d35ec41770b85e2b4cafdff21)
3. [](https://git.kernel.org/stable/c/eac10cf3a97ffd4b4deb0a29f57c118225a42850)
4. [](https://git.kernel.org/stable/c/330f6bcdcef03f70f81db5f2ed6747af656a09f2)
5. [](https://git.kernel.org/stable/c/9b41a9b9c8be8c552f10633453fdb509e83b66f8)
6. [](https://git.kernel.org/stable/c/518e2c46b5dbce40b1aa0100001d03c3ceaa7d38)
7. [](https://git.kernel.org/stable/c/895cdd9aa9546523df839f9cc1488a0ecc1e0731)
8. [](https://git.kernel.org/stable/c/a1ba19a1ae7cd1e324685ded4ab563e78fe68648) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-13567, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-13567 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13567
- **State**: PUBLISHED
- **Published Date**: April 01, 2025 at 05:22 UTC
- **Last Updated**: April 01, 2025 at 16:20 UTC
- **Reserved Date**: January 21, 2025 at 02:50 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Awesome Support – WordPress HelpDesk & Support Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 6.3.1 via the 'awesome-support' directory. This makes it possible for unauthenticated attackers to extract sensitive data stored insecurely in the /wp-content/uploads/awesome-support directory which can contain file attachments included in support tickets. The vulnerability was partially patched in version 6.3.1.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**awesomesupport - Awesome Support – WordPress HelpDesk & Support Plugin**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/24c54ef5-ad02-4767-bca6-f74c539d3068?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/awesome-support/trunk/includes/file-uploader/class-file-uploader.php)
3. [](https://plugins.trac.wordpress.org/changeset/3250497/)
4. [](https://plugins.trac.wordpress.org/changeset/3262629/)
### Credits
- Tim Coen |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-45307, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-45307 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-45307
- **State**: PUBLISHED
- **Published Date**: September 03, 2024 at 19:01 UTC
- **Last Updated**: September 03, 2024 at 19:31 UTC
- **Reserved Date**: August 26, 2024 at 18:25 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
SudoBot, a Discord moderation bot, is vulnerable to privilege escalation and exploit of the `-config` command in versions prior to 9.26.7. Anyone is theoretically able to update any configuration of the bot and potentially gain control over the bot's settings. Every version of v9 before v9.26.7 is affected. Other versions (e.g. v8) are not affected. Users should upgrade to version 9.26.7 to receive a patch. A workaround would be to create a command permission overwrite in the Database. A SQL statement provided in the GitHub Security Advisor can be executed to create a overwrite that disallows users without `ManageGuild` permission to run the `-config` command. Run the SQL statement for every server the bot is in, and replace `<guild_id>` with the appropriate Guild ID each time.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:H`
### Weakness Classification (CWE)
- CWE-285: Security Weakness
- CWE-862: Missing Authorization
### Affected Products
**onesoft-sudo - sudobot**
Affected versions:
- >= 9.0.0, < 9.26.7 (Status: affected)
### References
1. [https://github.com/onesoft-sudo/sudobot/security/advisories/GHSA-crgg-w3rr-r9h4](https://github.com/onesoft-sudo/sudobot/security/advisories/GHSA-crgg-w3rr-r9h4)
2. [https://github.com/onesoft-sudo/sudobot/commit/ef46ca98562f3c1abef4ff7dd94d8f7b8155ee50](https://github.com/onesoft-sudo/sudobot/commit/ef46ca98562f3c1abef4ff7dd94d8f7b8155ee50) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-24977, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-24977 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-24977
- **State**: PUBLISHED
- **Published Date**: February 01, 2023 at 09:09 UTC
- **Last Updated**: March 27, 2025 at 13:34 UTC
- **Reserved Date**: February 01, 2023 at 03:17 UTC
- **Assigned By**: apache
### Vulnerability Description
Out-of-bounds Read vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.1.0 through 1.5.0. Users are advised to upgrade to Apache InLong's latest version or cherry-pick https://github.com/apache/inlong/pull/7214 https://github.com/apache/inlong/pull/7214 to solve it.
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Apache Software Foundation - Apache InLong**
Affected versions:
- 1.1.0 (Status: affected)
### References
1. [](https://lists.apache.org/thread/ggozxorctn3tdll7bgmpwwcbjnd0s6w7)
### Credits
- This issue was discovered by s3gundo of Hundsun Tech |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-9178, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-9178 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-9178
- **State**: PUBLISHED
- **Published Date**: November 28, 2016 at 03:01 UTC
- **Last Updated**: August 06, 2024 at 02:42 UTC
- **Reserved Date**: November 04, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The __get_user_asm_ex macro in arch/x86/include/asm/uaccess.h in the Linux kernel before 4.7.5 does not initialize a certain integer variable, which allows local users to obtain sensitive information from kernel stack memory by triggering failure of a get_user_ex call.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/torvalds/linux/commit/1c109fabbd51863475cd12ac206bdd249aee35af)
2. [](http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1c109fabbd51863475cd12ac206bdd249aee35af)
3. [[oss-security] 20161104 Re: kernel: fix minor infoleak in get_user_ex()](http://www.openwall.com/lists/oss-security/2016/11/04/4)
4. [](https://bugzilla.redhat.com/show_bug.cgi?id=1391908)
5. [94144](http://www.securityfocus.com/bid/94144)
6. [](http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.5) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-0831, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-0831 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-0831
- **State**: PUBLISHED
- **Published Date**: July 20, 2011 at 22:36 UTC
- **Last Updated**: August 06, 2024 at 22:05 UTC
- **Reserved Date**: February 04, 2011 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Enterprise Config Management component in Oracle Database Server 10.1.0.5, 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.1, and 11.2.0.2; and Oracle Enterprise Manager Grid Control 10.1.0.6 and 10.2.0.5; allows remote authenticated users to affect confidentiality and integrity via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [TA11-201A](http://www.us-cert.gov/cas/techalerts/TA11-201A.html)
2. [](http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-2562, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-2562 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2562
- **State**: PUBLISHED
- **Published Date**: July 12, 2023 at 04:38 UTC
- **Last Updated**: October 22, 2024 at 19:33 UTC
- **Reserved Date**: May 06, 2023 at 14:33 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Gallery Metabox for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the refresh_metabox function in versions up to, and including, 1.5. This makes it possible for subscriber-level attackers to obtain a list of images attached to a post.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Affected Products
**billerickson - Gallery Metabox**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/951e4651-56d6-474d-84b3-5a7cfc357b9f?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/gallery-metabox/trunk/gallery-metabox.php?rev=611664#L203)
### Credits
- Marco Wotschka |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6440, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6440 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6440
- **State**: PUBLISHED
- **Published Date**: March 28, 2017 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 12:17 UTC
- **Reserved Date**: September 16, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
VideoLAN VLC media player before 2.1.5 allows remote attackers to execute arbitrary code or cause a denial of service.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.videolan.org/developers/vlc-branch/NEWS)
2. [72950](http://www.securityfocus.com/bid/72950)
3. [GLSA-201603-08](https://security.gentoo.org/glsa/201603-08)
4. [[oss-security] 20150304 CVE-2014-6440: Heap Overflow in VLC Transcode Module](http://seclists.org/oss-sec/2015/q1/751)
5. [](http://billblough.net/blog/2015/03/04/cve-2014-6440-heap-overflow-in-vlc-transcode-module/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-13148, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-13148 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-13148
- **State**: PUBLISHED
- **Published Date**: December 06, 2017 at 14:00 UTC
- **Last Updated**: September 17, 2024 at 02:11 UTC
- **Reserved Date**: August 23, 2017 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
A denial of service vulnerability in the Android media framework (libmpeg2). Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID A-65717533.
### Affected Products
**Google Inc. - Android**
Affected versions:
- 6.0 (Status: affected)
- 6.0.1 (Status: affected)
- 7.0 (Status: affected)
- 7.1.1 (Status: affected)
- 7.1.2 (Status: affected)
- 8.0 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2017-12-01)
2. [102126](http://www.securityfocus.com/bid/102126) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-47908, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-47908 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-47908
- **State**: PUBLISHED
- **Published Date**: January 03, 2023 at 00:00 UTC
- **Last Updated**: April 10, 2025 at 15:48 UTC
- **Reserved Date**: December 26, 2022 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Stack-based buffer overflow vulnerability in V-Server v4.0.12.0 and earlier allows a local attacker to obtain the information and/or execute arbitrary code by having a user to open a specially crafted project file.
### Affected Products
**FUJI ELECTRIC CO., LTD. and Hakko Electronics Co., Ltd. - V-Server**
Affected versions:
- v4.0.12.0 and earlier (Status: affected)
### References
1. [](https://monitouch.fujielectric.com/site/download-e/03tellus_inf/index.php)
2. [](https://jvn.jp/en/vu/JVNVU92811888/index.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-26378, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-26378 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-26378
- **State**: PUBLISHED
- **Published Date**: February 12, 2025 at 13:30 UTC
- **Last Updated**: February 17, 2025 at 10:11 UTC
- **Reserved Date**: February 07, 2025 at 09:03 UTC
- **Assigned By**: Nozomi
### Vulnerability Description
A CWE-862 "Missing Authorization" in maxprofile/users/routes.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated (low-privileged) attacker to reset passwords, including the ones of administrator accounts, via crafted HTTP requests.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Q-Free - MaxTime**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26378)
### Credits
- Diego Giubertoni of Nozomi Networks found this bug during a security research activity.
- Q-Free |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-1272, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-1272 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-1272
- **State**: PUBLISHED
- **Published Date**: May 03, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:51 UTC
- **Reserved Date**: May 01, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
wmtv 0.6.5 and earlier does not properly drop privileges, which allows local users to execute arbitrary commands via the -e (external command) option.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [3658](http://www.securityfocus.com/bid/3658)
2. [DSA-092](http://www.debian.org/security/2001/dsa-092)
3. [wmtv-execute-commands(7669)](http://www.iss.net/security_center/static/7669.php) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-14377, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-14377 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14377
- **State**: PUBLISHED
- **Published Date**: November 29, 2017 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 19:27 UTC
- **Reserved Date**: September 12, 2017 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
EMC RSA Authentication Agent for Web: Apache Web Server version 8.0 and RSA Authentication Agent for Web: Apache Web Server version 8.0.1 prior to Build 618 have a security vulnerability that could potentially lead to authentication bypass.
### Affected Products
**n/a - RSA Authentication Agent for Web for Apache Web Server RSA Authentication Agent for Web: Apache Web Server version 8.0 and RSA Authentication Agent for Web: Apache Web Server version 8.0.1 prior to Build 618**
Affected versions:
- RSA Authentication Agent for Web for Apache Web Server RSA Authentication Agent for Web: Apache Web Server version 8.0 and RSA Authentication Agent for Web: Apache Web Server version 8.0.1 prior to Build 618 (Status: affected)
### References
1. [1039876](http://www.securitytracker.com/id/1039876)
2. [101980](http://www.securityfocus.com/bid/101980)
3. [](http://seclists.org/fulldisclosure/2017/Nov/46) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-19168, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-19168 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-19168
- **State**: PUBLISHED
- **Published Date**: November 11, 2018 at 00:00 UTC
- **Last Updated**: September 16, 2024 at 17:24 UTC
- **Reserved Date**: November 10, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Shell Metacharacter Injection in www/modules/save.php in FruityWifi (aka PatatasFritas/PatataWifi) through 2.4 allows remote attackers to execute arbitrary code with root privileges via a crafted mod_name parameter in a POST request. NOTE: unlike in CVE-2018-17317, the attacker does not need a valid session.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/xtr4nge/FruityWifi/issues/250) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-41174, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-41174 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-41174
- **State**: PUBLISHED
- **Published Date**: September 26, 2023 at 20:12 UTC
- **Last Updated**: February 13, 2025 at 17:08 UTC
- **Reserved Date**: September 14, 2023 at 19:03 UTC
- **Assigned By**: apple
### Vulnerability Description
The issue was addressed with improved memory handling. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, watchOS 10. An app may be able to execute arbitrary code with kernel privileges.
### Affected Products
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT213938)
2. [](https://support.apple.com/en-us/HT213936)
3. [](https://support.apple.com/en-us/HT213937)
4. [](http://seclists.org/fulldisclosure/2023/Oct/10)
5. [](http://seclists.org/fulldisclosure/2023/Oct/8)
6. [](http://seclists.org/fulldisclosure/2023/Oct/9) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-42138, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-42138 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-42138
- **State**: PUBLISHED
- **Published Date**: July 30, 2024 at 07:46 UTC
- **Last Updated**: May 04, 2025 at 09:23 UTC
- **Reserved Date**: July 29, 2024 at 15:50 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
mlxsw: core_linecards: Fix double memory deallocation in case of invalid INI file
In case of invalid INI file mlxsw_linecard_types_init() deallocates memory
but doesn't reset pointer to NULL and returns 0. In case of any error
occurred after mlxsw_linecard_types_init() call, mlxsw_linecards_init()
calls mlxsw_linecard_types_fini() which performs memory deallocation again.
Add pointer reset to NULL.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
### Affected Products
**Linux - Linux**
Affected versions:
- b217127e5e4ee0ecfce7c5f84cfe082238123bda (Status: affected)
- b217127e5e4ee0ecfce7c5f84cfe082238123bda (Status: affected)
- b217127e5e4ee0ecfce7c5f84cfe082238123bda (Status: affected)
- b217127e5e4ee0ecfce7c5f84cfe082238123bda (Status: affected)
**Linux - Linux**
Affected versions:
- 5.19 (Status: affected)
- 0 (Status: unaffected)
- 6.1.98 (Status: unaffected)
- 6.6.39 (Status: unaffected)
- 6.9.9 (Status: unaffected)
- 6.10 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/ab557f5cd993a3201b09593633d04b891263d5c0)
2. [](https://git.kernel.org/stable/c/f8b55a465b0e8a500179808166fe9420f5c091a1)
3. [](https://git.kernel.org/stable/c/9af7437669b72f804fc4269f487528dbbed142a2)
4. [](https://git.kernel.org/stable/c/8ce34dccbe8fa7d2ef86f2d8e7db2a9b67cabfc3) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-37453, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-37453 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-37453
- **State**: PUBLISHED
- **Published Date**: July 25, 2021 at 20:11 UTC
- **Last Updated**: August 04, 2024 at 01:16 UTC
- **Reserved Date**: July 25, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross Site Scripting (XSS) exists in NCH Axon PBX v2.22 and earlier via the extension name (stored).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.nch.com.au/pbx/index.html)
2. [](https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_XSS.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-23480, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-23480 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-23480
- **State**: PUBLISHED
- **Published Date**: March 03, 2025 at 13:30 UTC
- **Last Updated**: March 03, 2025 at 16:00 UTC
- **Reserved Date**: January 16, 2025 at 11:25 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound RSVP ME allows Stored XSS. This issue affects RSVP ME: from n/a through 1.9.9.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**NotFound - RSVP ME**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/rsvp-me/vulnerability/wordpress-rsvp-me-plugin-1-9-9-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- SOPROBRO (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-25334, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-25334 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-25334
- **State**: PUBLISHED
- **Published Date**: October 19, 2023 at 09:36 UTC
- **Last Updated**: August 03, 2024 at 04:36 UTC
- **Reserved Date**: February 18, 2022 at 17:18 UTC
- **Assigned By**: NCSC-NL
### Vulnerability Description
The Texas Instruments OMAP L138 (secure variants) trusted execution environment (TEE) lacks a bounds check on the signature size field in the SK_LOAD module loading routine, present in mask ROM. A module with a sufficiently large signature field causes a stack overflow, affecting secure kernel data pages. This can be leveraged to obtain arbitrary code execution in secure supervisor context by overwriting a SHA256 function pointer in the secure kernel data area when loading a forged, unsigned SK_LOAD module encrypted with the CEK (obtainable through CVE-2022-25332). This constitutes a full break of the TEE security architecture.
### CVSS Metrics
- **CVSS Base Score**: 8.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:F/RL:U/RC:C/CR:H/IR:H/AR:H/MAV:L/MAC:L/MPR:H/MUI:N/MS:C/MC:H/MI:H/MA:H`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Texas Instruments - OMAP**
Affected versions:
- L138 (Status: affected)
### References
1. [TETRA:BURST](https://tetraburst.com/)
### Credits
- Midnight Blue |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-4187, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-4187 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-4187
- **State**: PUBLISHED
- **Published Date**: June 17, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 11:04 UTC
- **Reserved Date**: June 17, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in signup.php in ClipBucket allows remote attackers to inject arbitrary web script or HTML via the Username field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/127098/ClipBucket-CMS-Cross-Site-Scripting.html)
2. [20140614 ClipBucket CMS Xss Vulnerability](http://www.securityfocus.com/archive/1/532432/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-2098, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-2098 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2098
- **State**: PUBLISHED
- **Published Date**: April 15, 2023 at 11:31 UTC
- **Last Updated**: August 02, 2024 at 06:12 UTC
- **Reserved Date**: April 15, 2023 at 09:11 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in SourceCodester Vehicle Service Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /inc/topBarNav.php. The manipulation of the argument search leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-226106 is the identifier assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**SourceCodester - Vehicle Service Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://vuldb.com/?id.226106)
2. [](https://vuldb.com/?ctiid.226106)
3. [](https://github.com/E1CHO/cve_hub/blob/main/Vehicle%20Service%20Management%20System/Vehicle%20Service%20Management%20System%20-%20vuln%207.pdf)
### Credits
- SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-2600, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-2600 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2600
- **State**: PUBLISHED
- **Published Date**: August 22, 2022 at 15:05 UTC
- **Last Updated**: August 03, 2024 at 00:46 UTC
- **Reserved Date**: August 01, 2022 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Auto-hyperlink URLs WordPress plugin through 5.4.1 does not set rel="noopener noreferer" on generated links, which can lead to Tab Nabbing by giving the target site access to the source tab through the window.opener DOM object.
### Weakness Classification (CWE)
- CWE-1022: Security Weakness
### Affected Products
**Unknown - Auto-hyperlink URLs**
Affected versions:
- 5.4.1 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/01bbdefd-bdc3-43ef-9f35-6e7ebe786be2)
### Credits
- Daniel Ruf |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-6722, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-6722 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6722
- **State**: PUBLISHED
- **Published Date**: October 14, 2015 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 07:29 UTC
- **Reserved Date**: August 26, 2015 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
The CBSharedReviewStatusDialog method in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2015-6707, CVE-2015-6708, CVE-2015-6709, CVE-2015-6710, CVE-2015-6711, CVE-2015-6712, CVE-2015-6713, CVE-2015-6714, CVE-2015-6715, CVE-2015-6716, CVE-2015-6717, CVE-2015-6718, CVE-2015-6719, CVE-2015-6720, CVE-2015-6721, CVE-2015-6723, CVE-2015-6724, CVE-2015-6725, CVE-2015-7614, CVE-2015-7616, CVE-2015-7618, CVE-2015-7619, CVE-2015-7620, and CVE-2015-7623.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.zerodayinitiative.com/advisories/ZDI-15-501)
2. [](https://helpx.adobe.com/security/products/acrobat/apsb15-24.html)
3. [1033796](http://www.securitytracker.com/id/1033796) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-45935, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-45935 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-45935
- **State**: PUBLISHED
- **Published Date**: January 06, 2023 at 09:33 UTC
- **Last Updated**: April 10, 2025 at 13:35 UTC
- **Reserved Date**: November 27, 2022 at 08:53 UTC
- **Assigned By**: apache
### Vulnerability Description
Usage of temporary files with insecure permissions by the Apache James server allows an attacker with local access to access private user data in transit.
Vulnerable components includes the SMTP stack and IMAP APPEND command.
This issue affects Apache James server version 3.7.2 and prior versions.
### Weakness Classification (CWE)
- CWE-668: Security Weakness
### Affected Products
**Apache Software Foundation - Apache James server**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://lists.apache.org/thread/j61fo8xc1rxtofrn8vc33whx35s9cj1d)
### Credits
- Benoit Tellier |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-24345, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-24345 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-24345
- **State**: PUBLISHED
- **Published Date**: April 30, 2025 at 11:35 UTC
- **Last Updated**: April 30, 2025 at 14:44 UTC
- **Reserved Date**: January 20, 2025 at 15:09 UTC
- **Assigned By**: bosch
### Vulnerability Description
A vulnerability in the “Hosts” functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to manipulate the “hosts” file in an unintended manner via a crafted HTTP request.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Affected Products
**Bosch Rexroth AG - ctrlX OS - Device Admin**
Affected versions:
- 1.20.0 (Status: affected)
- 2.6.0 (Status: affected)
### References
1. [https://psirt.bosch.com/security-advisories/BOSCH-SA-640452.html](https://psirt.bosch.com/security-advisories/BOSCH-SA-640452.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-3642, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-3642 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3642
- **State**: PUBLISHED
- **Published Date**: October 06, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 10:50 UTC
- **Reserved Date**: May 14, 2014 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
vmdb/app/controllers/application_controller/performance.rb in Red Hat CloudForms 3.1 Management Engine (CFME) before 5.3 allows remote authenticated users to gain privileges via unspecified vectors, related to an "insecure send method."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1092894)
2. [RHSA-2014:1317](http://rhn.redhat.com/errata/RHSA-2014-1317.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-43149, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-43149 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-43149
- **State**: PUBLISHED
- **Published Date**: October 12, 2023 at 00:00 UTC
- **Last Updated**: September 18, 2024 at 15:46 UTC
- **Reserved Date**: September 18, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SPA-Cart 1.9.0.3 is vulnerable to Cross Site Request Forgery (CSRF) that allows a remote attacker to add an admin user with role status.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/MinoTauro2020/CVE-2023-43149) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-9482, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-9482 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-9482
- **State**: PUBLISHED
- **Published Date**: July 13, 2018 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 02:50 UTC
- **Reserved Date**: November 21, 2016 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
Code generated by PHP FormMail Generator may allow a remote unauthenticated user to bypass authentication in the to access the administrator panel by navigating directly to /admin.php?mod=admin&func=panel
### Weakness Classification (CWE)
- CWE-302: Security Weakness
### Affected Products
**PHP FormMail - Generator**
Affected versions:
- 2016-12-06 (Status: affected)
### References
1. [VU#494015](https://www.kb.cert.org/vuls/id/494015)
2. [94778](http://www.securityfocus.com/bid/94778)
### Credits
- Thanks to Pouya Darabi for reporting this vulnerability. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-4521, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-4521 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-4521
- **State**: PUBLISHED
- **Published Date**: February 21, 2012 at 11:00 UTC
- **Last Updated**: August 07, 2024 at 00:09 UTC
- **Reserved Date**: November 22, 2011 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
SQL injection vulnerability in Advantech/BroadWin WebAccess before 7.0 allows remote attackers to execute arbitrary SQL commands via crafted string input.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.us-cert.gov/control_systems/pdf/ICSA-12-047-01.pdf)
2. [52051](http://www.securityfocus.com/bid/52051) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-39317, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-39317 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-39317
- **State**: PUBLISHED
- **Published Date**: November 16, 2022 at 00:00 UTC
- **Last Updated**: April 23, 2025 at 16:37 UTC
- **Reserved Date**: September 02, 2022 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing a range check for input offset index in ZGFX decoder. A malicious server can trick a FreeRDP based client to read out of bound data and try to decode it. This issue has been addressed in version 2.9.0. There are no known workarounds for this issue.
### CVSS Metrics
- **CVSS Base Score**: 4.6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**FreeRDP - FreeRDP**
Affected versions:
- < 2.9.0 (Status: affected)
### References
1. [](https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-99cm-4gw7-c8jh)
2. [FEDORA-2022-fd6e43dec8](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDOTAOJBCZKREZJPT6VZ25GESI5T6RBG/)
3. [FEDORA-2022-076b1c9978](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YGQN3OWQNHSMWKOF4D35PF5ASKNLC74B/)
4. [GLSA-202401-16](https://security.gentoo.org/glsa/202401-16) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-1441, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-1441 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1441
- **State**: PUBLISHED
- **Published Date**: December 26, 2014 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 01:21 UTC
- **Reserved Date**: April 15, 2010 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Multiple heap-based buffer overflows in VideoLAN VLC media player before 1.0.6 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted byte stream to the (1) A/52, (2) DTS, or (3) MPEG Audio decoder.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.videolan.org/security/sa1003.html)
2. [[oss-security] 20100428 Re: CVE request: VLC <1.0.6 Multiple issues](http://openwall.com/lists/oss-security/2010/04/28/4) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.