System
stringclasses
1 value
User
stringlengths
139
142
Assistant
stringlengths
279
328k
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-38288, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-38288 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-38288 - **State**: PUBLISHED - **Published Date**: July 25, 2024 at 00:00 UTC - **Last Updated**: August 02, 2024 at 04:04 UTC - **Reserved Date**: June 13, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A command-injection issue in the Certificate Signing Request (CSR) functionality in R-HUB TurboMeeting through 8.x allows authenticated attackers with administrator privileges to execute arbitrary commands on the underlying server as root. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.rhubcom.com/v5/manuals.html) 2. [](https://github.com/google/security-research/security/advisories/GHSA-gx6g-8mvx-3q5c)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-2745, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-2745 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-2745 - **State**: PUBLISHED - **Published Date**: August 11, 2022 at 04:55 UTC - **Last Updated**: April 15, 2025 at 13:53 UTC - **Reserved Date**: August 10, 2022 at 00:00 UTC - **Assigned By**: VulDB ### Vulnerability Description A vulnerability, which was classified as critical, was found in SourceCodester Gym Management System. This affects an unknown part of the file /admin/add_trainers.php of the component Add New Trainer. The manipulation of the argument trainer_name leads to sql injection. It is possible to initiate the attack remotely. The identifier VDB-206013 was assigned to this vulnerability. ### CVSS Metrics - **CVSS Base Score**: 6.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-89: SQL Injection ### Affected Products **SourceCodester - Gym Management System** Affected versions: - n/a (Status: affected) ### References 1. [](https://vuldb.com/?id.206013)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-3707, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-3707 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-3707 - **State**: PUBLISHED - **Published Date**: November 15, 2014 at 20:00 UTC - **Last Updated**: August 06, 2024 at 10:50 UTC - **Reserved Date**: May 14, 2014 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description The curl_easy_duphandle function in libcurl 7.17.1 through 7.38.0, when running with the CURLOPT_COPYPOSTFIELDS option, does not properly copy HTTP POST data for an easy handle, which triggers an out-of-bounds read that allows remote web servers to read sensitive memory information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html) 2. [DSA-3069](http://www.debian.org/security/2014/dsa-3069) 3. [](http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html) 4. [USN-2399-1](http://www.ubuntu.com/usn/USN-2399-1) 5. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html) 6. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html) 7. [APPLE-SA-2015-08-13-2](http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html) 8. [RHSA-2015:1254](http://rhn.redhat.com/errata/RHSA-2015-1254.html) 9. [70988](http://www.securityfocus.com/bid/70988) 10. [](http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743) 11. [openSUSE-SU-2015:0248](http://lists.opensuse.org/opensuse-updates/2015-02/msg00040.html) 12. [](https://support.apple.com/kb/HT205031) 13. [](http://curl.haxx.se/docs/adv_20141105.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-24200, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-24200 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-24200 - **State**: PUBLISHED - **Published Date**: February 10, 2025 at 19:04 UTC - **Last Updated**: March 20, 2025 at 14:31 UTC - **Reserved Date**: January 17, 2025 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description An authorization issue was addressed with improved state management. This issue is fixed in iPadOS 17.7.5, iOS 18.3.1 and iPadOS 18.3.1. A physical attack may disable USB Restricted Mode on a locked device. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals. ### Affected Products **Apple - iPadOS** Affected versions: - unspecified (Status: affected) **Apple - iOS and iPadOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/122173) 2. [](https://support.apple.com/en-us/122174)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-41031, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-41031 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-41031 - **State**: PUBLISHED - **Published Date**: September 22, 2023 at 16:07 UTC - **Last Updated**: September 24, 2024 at 18:03 UTC - **Reserved Date**: August 22, 2023 at 14:09 UTC - **Assigned By**: XI ### Vulnerability Description Command injection in homemng.htm in Juplink RX4-1500 versions V1.0.2, V1.0.3, V1.0.4, and V1.0.5 allows remote authenticated attackers to execute commands via specially crafted requests to the vulnerable endpoint. ### CVSS Metrics - **CVSS Base Score**: 8/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-77: Security Weakness ### Affected Products **Juplink - RX4-1500** Affected versions: - V1.0.2 (Status: affected) ### References 1. [](https://blog.exodusintel.com/2023/09/18/juplink-rx4-1500-homemng-command-injection-vulnerability/) ### Credits - Exodus Intelligence
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-0778, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-0778 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-0778 - **State**: PUBLISHED - **Published Date**: March 15, 2022 at 17:05 UTC - **Last Updated**: September 17, 2024 at 00:01 UTC - **Reserved Date**: February 28, 2022 at 00:00 UTC - **Assigned By**: openssl ### Vulnerability Description The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc). ### Affected Products **OpenSSL - OpenSSL** Affected versions: - Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1) (Status: affected) - Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m) (Status: affected) - Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc) (Status: affected) ### References 1. [](https://www.openssl.org/news/secadv/20220315.txt) 2. [](https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246) 3. [](https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65) 4. [](https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83) 5. [DSA-5103](https://www.debian.org/security/2022/dsa-5103) 6. [[debian-lts-announce] 20220317 [SECURITY] [DLA 2952-1] openssl security update](https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html) 7. [[debian-lts-announce] 20220317 [SECURITY] [DLA 2953-1] openssl1.0 security update](https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html) 8. [FEDORA-2022-a5f51502f0](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/) 9. [FEDORA-2022-9e88b5d8d7](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/) 10. [FEDORA-2022-8bb51f6901](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/) 11. [](https://www.oracle.com/security-alerts/cpuapr2022.html) 12. [](https://security.netapp.com/advisory/ntap-20220321-0002/) 13. [](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002) 14. [](https://www.tenable.com/security/tns-2022-06) 15. [](https://www.tenable.com/security/tns-2022-07) 16. [](https://www.tenable.com/security/tns-2022-08) 17. [20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina](http://seclists.org/fulldisclosure/2022/May/33) 18. [20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6](http://seclists.org/fulldisclosure/2022/May/35) 19. [20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4](http://seclists.org/fulldisclosure/2022/May/38) 20. [](https://www.oracle.com/security-alerts/cpujul2022.html) 21. [](https://support.apple.com/kb/HT213257) 22. [](https://support.apple.com/kb/HT213256) 23. [](https://support.apple.com/kb/HT213255) 24. [](https://www.tenable.com/security/tns-2022-09) 25. [](https://security.netapp.com/advisory/ntap-20220429-0005/) 26. [](http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html) 27. [](https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf) 28. [GLSA-202210-02](https://security.gentoo.org/glsa/202210-02) 29. [](https://security.netapp.com/advisory/ntap-20240621-0006/) ### Credits - Tavis Ormandy (Google)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-14232, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-14232 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-14232 - **State**: PUBLISHED - **Published Date**: August 15, 2019 at 16:24 UTC - **Last Updated**: August 05, 2024 at 19:20 UTC - **Reserved Date**: September 10, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The read_chunk function in flif-dec.cpp in Free Lossless Image Format (FLIF) 0.3 allows remote attackers to cause a denial of service (invalid memory read and application crash) via a crafted flif file. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://cxsecurity.com/cveshow/CVE-2017-14232) 2. [](https://www.oracle.com/security-alerts/cpuapr2020.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-20589, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-20589 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-20589 - **State**: PUBLISHED - **Published Date**: December 16, 2022 at 00:00 UTC - **Last Updated**: April 18, 2025 at 14:49 UTC - **Reserved Date**: October 14, 2021 at 00:00 UTC - **Assigned By**: google_android ### Vulnerability Description In valid_va_secbuf_check of drm_access_control.c, there is a possible ID due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238841928References: N/A ### Affected Products **n/a - Android** Affected versions: - Android kernel (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/pixel/2022-12-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2001-1337, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2001-1337 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2001-1337 - **State**: PUBLISHED - **Published Date**: May 03, 2002 at 04:00 UTC - **Last Updated**: August 08, 2024 at 04:51 UTC - **Reserved Date**: May 01, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Beck IPC GmbH IPC@CHIP Embedded-Webserver allows remote attackers to cause a denial of service via a long HTTP request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [2774](http://www.securityfocus.com/bid/2774) 2. [20010524 IPC@Chip Security](http://www.securityfocus.com/archive/1/186418) 3. [ipcchip-http-dos(6594)](http://www.iss.net/security_center/static/6594.php)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-5618, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-5618 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-5618 - **State**: PUBLISHED - **Published Date**: October 20, 2023 at 11:33 UTC - **Last Updated**: February 05, 2025 at 19:02 UTC - **Reserved Date**: October 17, 2023 at 16:38 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Modern Footnotes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode in versions up to, and including, 1.4.16 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. ### CVSS Metrics - **CVSS Base Score**: 6.4/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N` ### Affected Products **prismtechstudios - Modern Footnotes** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/c20c674f-54b5-470f-b470-07a63501eb4d?source=cve) 2. [](https://plugins.trac.wordpress.org/changeset/2980695/modern-footnotes) ### Credits - Dmitrii Ignatyev
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-25271, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-25271 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-25271 - **State**: PUBLISHED - **Published Date**: February 16, 2022 at 00:00 UTC - **Last Updated**: August 03, 2024 at 04:36 UTC - **Reserved Date**: February 16, 2022 at 00:00 UTC - **Assigned By**: drupal ### Vulnerability Description Drupal core's form API has a vulnerability where certain contributed or custom modules' forms may be vulnerable to improper input validation. This could allow an attacker to inject disallowed values or overwrite data. Affected forms are uncommon, but in certain cases an attacker could alter critical or sensitive data. ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **Drupal - Core** Affected versions: - 9.3.x (Status: affected) - 9.2.x (Status: affected) - 7.x (Status: affected) ### References 1. [](https://www.drupal.org/sa-core-2022-003) 2. [FEDORA-2022-9d655503ea](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/) 3. [FEDORA-2022-bf18450366](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-29508, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-29508 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-29508 - **State**: PUBLISHED - **Published Date**: May 11, 2021 at 16:35 UTC - **Last Updated**: August 03, 2024 at 22:11 UTC - **Reserved Date**: March 30, 2021 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Due to how Wire handles type information in its serialization format, malicious payloads can be passed to a deserializer. e.g. using a surrogate on the sender end, an attacker can pass information about a different type for the receiving end. And by doing so allowing the serializer to create any type on the deserializing end. This is the same issue that exists for .NET BinaryFormatter https://docs.microsoft.com/en-us/visualstudio/code-quality/ca2300?view=vs-2019. This also applies to the fork of Wire. ### CVSS Metrics - **CVSS Base Score**: 9.1/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H` ### Weakness Classification (CWE) - CWE-502: Deserialization of Untrusted Data ### Affected Products **AsynkronIT - Wire** Affected versions: - <= 1.0.0 (Status: affected) ### References 1. [](https://github.com/AsynkronIT/Wire/security/advisories/GHSA-hpw7-3vq3-mmv6) 2. [](https://www.nuget.org/packages/Wire/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-0828, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-0828 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-0828 - **State**: PUBLISHED - **Published Date**: April 02, 2014 at 01:00 UTC - **Last Updated**: August 06, 2024 at 09:27 UTC - **Reserved Date**: January 06, 2014 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description Cross-site scripting (XSS) vulnerability in the WCM (Web Content Manager) UI in IBM WebSphere Portal 6.1.0.x through 6.1.0.6 CF27, 6.1.5.x through 6.1.5.3 CF27, 7.0.0.x through 7.0.0.2 CF27, and 8.0.0.x before 8.0.0.1 CF11 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www-01.ibm.com/support/docview.wss?uid=swg21667016) 2. [PI10734](http://www-01.ibm.com/support/docview.wss?uid=swg1PI10734) 3. [ibm-wsportal-cve20140828-wcm-xss(90566)](https://exchange.xforce.ibmcloud.com/vulnerabilities/90566) 4. [66556](http://www.securityfocus.com/bid/66556)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-35580, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-35580 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-35580 - **State**: PUBLISHED - **Published Date**: May 20, 2021 at 15:25 UTC - **Last Updated**: August 04, 2024 at 17:09 UTC - **Reserved Date**: December 20, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A local file inclusion vulnerability in the FileServlet in all SearchBlox before 9.2.2 allows remote, unauthenticated users to read arbitrary files from the operating system via a /searchblox/servlet/FileServlet?col=url= request. Additionally, this may be used to read the contents of the SearchBlox configuration file (e.g., searchblox/WEB-INF/config.xml), which contains both the Super Admin's API key and the base64 encoded SHA1 password hashes of other SearchBlox users. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://developer.searchblox.com/docs/getting-started-with-searchblox) 2. [](https://hateshape.github.io/general/2021/05/11/CVE-2020-35580.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-5948, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-5948 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-5948 - **State**: PUBLISHED - **Published Date**: September 06, 2017 at 21:00 UTC - **Last Updated**: August 06, 2024 at 07:06 UTC - **Reserved Date**: August 06, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Race condition in SuiteCRM before 7.2.3 allows remote attackers to execute arbitrary code. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-5947. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [[oss-security] 20150806 Re: CVE Request: SuiteCRM Post-Auth Race Condition Shell Upload Remote Code Execution.](http://www.openwall.com/lists/oss-security/2015/08/06/6) 2. [](https://github.com/salesagility/SuiteCRM/issues/333) 3. [](https://github.com/salesagility/SuiteCRM/commit/b1b3fd61c7697ad2073cd253d31c9462929e7bb5) 4. [](https://github.com/XiphosResearch/exploits/tree/master/suiteshell)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-3539, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-3539 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-3539 - **State**: PUBLISHED - **Published Date**: October 14, 2010 at 17:00 UTC - **Last Updated**: August 07, 2024 at 03:11 UTC - **Reserved Date**: September 20, 2010 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the PeopleSoft Enterprise FMS - GL component in Oracle PeopleSoft and JDEdwards Suite 8.9 Bundle #38, 9.0 Bundle #31, and 9.1 Bundle #6 allows remote authenticated users to affect confidentiality and integrity via unknown vectors, a different vulnerability than CVE-2010-3538. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html) 2. [TA10-287A](http://www.us-cert.gov/cas/techalerts/TA10-287A.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-46897, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-46897 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-46897 - **State**: PUBLISHED - **Published Date**: October 18, 2024 at 06:03 UTC - **Last Updated**: October 18, 2024 at 16:32 UTC - **Reserved Date**: October 03, 2024 at 07:09 UTC - **Assigned By**: jpcert ### Vulnerability Description Incorrect permission assignment for critical resource issue exists in Exment v6.1.4 and earlier and Exment v5.0.11 and earlier. A logged-in user with the permission of table management may obtain and/or alter the information of the unauthorized table. ### Weakness Classification (CWE) - CWE-732: Security Weakness ### Affected Products **Kajitori Co.,Ltd - Exment** Affected versions: - v6.1.4 and earlier (Status: affected) **Kajitori Co.,Ltd - Exment** Affected versions: - v5.0.11 and earlier (Status: affected) ### References 1. [](https://exment.net/vulnerability-correspondence-version-6-1-5-and-5-0-12-released/) 2. [](https://exment.net/docs/#/weakness/20241010_2) 3. [](https://jvn.jp/en/jp/JVN74538317/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-3134, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-3134 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-3134 - **State**: PUBLISHED - **Published Date**: October 04, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 23:01 UTC - **Reserved Date**: October 04, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Citrix Metaframe Presentation Server 3.0 and 4.0 allows remote attackers to bypass policy restrictions by downloading the launch.ica file and changing the client device name (ClientName). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://support.citrix.com/kb/entry%21default.jspa?categoryID=275&externalID=CTX107705) 2. [1014994](http://securitytracker.com/id?1014994) 3. [20050930 Citrix Metaframe Presentation Server bypassing policies](http://marc.info/?l=bugtraq&m=112811189420696&w=2) 4. [39](http://securityreason.com/securityalert/39) 5. [14989](http://www.securityfocus.com/bid/14989) 6. [](http://www.grupoitpro.com.ar/ctxpoliciesbypass.txt) 7. [17032](http://secunia.com/advisories/17032/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-8452, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-8452 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-8452 - **State**: PUBLISHED - **Published Date**: April 22, 2019 at 21:43 UTC - **Last Updated**: August 04, 2024 at 21:17 UTC - **Reserved Date**: February 18, 2019 at 00:00 UTC - **Assigned By**: checkpoint ### Vulnerability Description A hard-link created from log file archive of Check Point ZoneAlarm up to 15.4.062 or Check Point Endpoint Security client for Windows before E80.96 to any file on the system will get its permission changed so that all users can access that linked file. Doing this on files with limited access gains the local attacker higher privileges to the file. ### Weakness Classification (CWE) - CWE-65: Security Weakness ### Affected Products **Check Point ZoneAlarm - Check Point ZoneAlarm** Affected versions: - Check Point ZoneAlarm up to 15.4.062 (Status: affected) **Check Point ZoneAlarm - Check Point Endpoint Security client for Windows** Affected versions: - Check Point Endpoint Security client for Windows before E80.96 (Status: affected) ### References 1. [](https://www.zonealarm.com/software/release-history/zafavfw.html#15.4.260.17960) 2. [](https://supportcenter.us.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk150012) 3. [](http://packetstormsecurity.com/files/154754/CheckPoint-Endpoint-Security-Client-ZoneAlarm-Privilege-Escalation.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-26296, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-26296 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-26296 - **State**: PUBLISHED - **Published Date**: February 27, 2024 at 21:57 UTC - **Last Updated**: August 02, 2024 at 00:07 UTC - **Reserved Date**: February 16, 2024 at 19:42 UTC - **Assigned By**: hpe ### Vulnerability Description Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise. ### CVSS Metrics - **CVSS Base Score**: 7.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H` ### Affected Products **Hewlett Packard Enterprise (HPE) - Aruba ClearPass Policy Manager** Affected versions: - ClearPass Policy Manager 6.12.x: 6.12.0 (Status: affected) - ClearPass Policy Manager 6.11.x: 6.11.6 and below (Status: affected) - ClearPass Policy Manager 6.10.x: ClearPass 6.10.8 Hotfix Q4 2023 for Security issues and below (Status: affected) - ClearPass Policy Manager 6.9.x: ClearPass 6.9.13 Hotfix Q4 2023 for Security issues and below (Status: affected) ### References 1. [](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-001.txt) ### Credits - Kajetan Rostojek (@kaje11)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-20522, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-20522 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-20522 - **State**: PUBLISHED - **Published Date**: January 10, 2023 at 20:56 UTC - **Last Updated**: April 07, 2025 at 15:48 UTC - **Reserved Date**: October 27, 2022 at 18:53 UTC - **Assigned By**: AMD ### Vulnerability Description Insufficient input validation in ASP may allow an attacker with a malicious BIOS to potentially cause a denial of service. ### Affected Products ** AMD - 2nd Gen EPYC** Affected versions: - various (Status: affected) **AMD - 3rd Gen EPYC** Affected versions: - various (Status: affected) ### References 1. [](https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2004-1791, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2004-1791 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2004-1791 - **State**: PUBLISHED - **Published Date**: May 10, 2005 at 04:00 UTC - **Last Updated**: September 17, 2024 at 02:16 UTC - **Reserved Date**: May 04, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The web management interface in Edimax AR-6004 ADSL Routers uses a default administrator name and password, which also appear as the default login text for the management interface, which allows remote attackers to gain access. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20040106 EDIMAX AR-6004 Full Rate ADSL Router Cross Site Scripting Vulnerabillity](http://www.securityfocus.com/archive/1/349089) 2. [3511](http://www.osvdb.org/3511) 3. [1008643](http://securitytracker.com/id?1008643)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-19086, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-19086 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-19086 - **State**: PUBLISHED - **Published Date**: January 03, 2020 at 15:34 UTC - **Last Updated**: August 05, 2024 at 02:09 UTC - **Reserved Date**: November 18, 2019 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Gitlab Enterprise Edition (EE) before 12.5.1 has Insecure Permissions (issue 1 of 2). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://about.gitlab.com/blog/categories/releases/) 2. [](https://about.gitlab.com/blog/2019/11/27/security-release-gitlab-12-5-1-released/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-6937, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-6937 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-6937 - **State**: PUBLISHED - **Published Date**: February 15, 2024 at 17:21 UTC - **Last Updated**: April 24, 2025 at 15:13 UTC - **Reserved Date**: December 18, 2023 at 22:03 UTC - **Assigned By**: wolfSSL ### Vulnerability Description wolfSSL prior to 5.6.6 did not check that messages in one (D)TLS record do not span key boundaries. As a result, it was possible to combine (D)TLS messages using different keys into one (D)TLS record. The most extreme edge case is that, in (D)TLS 1.3, it was possible that an unencrypted (D)TLS 1.3 record from the server containing first a ServerHello message and then the rest of the first server flight would be accepted by a wolfSSL client. In (D)TLS 1.3 the handshake is encrypted after the ServerHello but a wolfSSL client would accept an unencrypted flight from the server. This does not compromise key negotiation and authentication so it is assigned a low severity rating. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **wolfSSL - wolfSSL** Affected versions: - 0 (Status: affected) ### References 1. [](https://github.com/wolfSSL/wolfssl/pull/7029) 2. [](https://www.wolfssl.com/docs/security-vulnerabilities/) ### Credits - Johannes Wilson from Sectra Communications and Linköping University
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2014-2815, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2014-2815 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2014-2815 - **State**: PUBLISHED - **Published Date**: August 12, 2014 at 21:00 UTC - **Last Updated**: August 06, 2024 at 10:28 UTC - **Reserved Date**: April 10, 2014 at 00:00 UTC - **Assigned By**: microsoft ### Vulnerability Description Microsoft OneNote 2007 SP3 allows remote attackers to execute arbitrary code via a crafted OneNote file that triggers creation of an executable file in a startup folder, aka "OneNote Remote Code Execution Vulnerability." ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1030717](http://www.securitytracker.com/id/1030717) 2. [60672](http://secunia.com/advisories/60672) 3. [](http://blogs.technet.com/b/srd/archive/2014/08/12/assessing-risk-for-the-august-2014-security-updates.aspx) 4. [MS14-048](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-048) 5. [69098](http://www.securityfocus.com/bid/69098) 6. [](http://packetstormsecurity.com/files/164419/Microsoft-Office-OneNote-2007-Remote-Code-Execution.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-3857, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-3857 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-3857 - **State**: REJECTED - **Published Date**: March 06, 2023 at 00:00 UTC - **Last Updated**: October 29, 2024 at 18:03 UTC - **Reserved Date**: November 04, 2022 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-7975, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-7975 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-7975 - **State**: PUBLISHED - **Published Date**: January 30, 2017 at 21:00 UTC - **Last Updated**: August 06, 2024 at 08:06 UTC - **Reserved Date**: October 23, 2015 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The nextvar function in NTP before 4.2.8p6 and 4.3.x before 4.3.90 does not properly validate the length of its input, which allows an attacker to cause a denial of service (application crash). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20160120 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products - January 2016](http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpd) 2. [USN-3096-1](http://www.ubuntu.com/usn/USN-3096-1) 3. [SUSE-SU-2016:1177](http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html) 4. [](https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03766en_us) 5. [81959](http://www.securityfocus.com/bid/81959) 6. [SUSE-SU-2016:1912](http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html) 7. [1034782](http://www.securitytracker.com/id/1034782) 8. [openSUSE-SU-2016:1292](http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html) 9. [VU#718152](https://www.kb.cert.org/vuls/id/718152) 10. [SUSE-SU-2016:1247](http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html) 11. [](https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03750en_us) 12. [](https://security.netapp.com/advisory/ntap-20171031-0001/) 13. [SUSE-SU-2016:1311](http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html) 14. [SUSE-SU-2016:2094](http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html) 15. [SUSE-SU-2016:1175](http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html) 16. [](http://support.ntp.org/bin/view/Main/NtpBug2937) 17. [FreeBSD-SA-16:09](https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc) 18. [](https://bto.bluecoat.com/security-advisory/sa113) 19. [openSUSE-SU-2016:1423](http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html) 20. [GLSA-201607-15](https://security.gentoo.org/glsa/201607-15)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2010-1504, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2010-1504 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2010-1504 - **State**: PUBLISHED - **Published Date**: April 23, 2010 at 14:00 UTC - **Last Updated**: August 07, 2024 at 01:28 UTC - **Reserved Date**: April 23, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in Google Chrome before 4.1.249.1059 allows remote attackers to inject arbitrary web script or HTML via vectors related to a chrome://downloads URI. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [63998](http://osvdb.org/63998) 2. [39603](http://www.securityfocus.com/bid/39603) 3. [39544](http://secunia.com/advisories/39544) 4. [](http://googlechromereleases.blogspot.com/2010/04/stable-update-security-fixes.html) 5. [39669](http://www.securityfocus.com/bid/39669) 6. [](http://bugs.chromium.org/40138) 7. [oval:org.mitre.oval:def:11418](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11418)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-39252, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-39252 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-39252 - **State**: PUBLISHED - **Published Date**: September 29, 2022 at 14:15 UTC - **Last Updated**: April 23, 2025 at 16:54 UTC - **Reserved Date**: September 02, 2022 at 00:00 UTC - **Assigned By**: GitHub_M ### Vulnerability Description matrix-rust-sdk is an implementation of a Matrix client-server library in Rust, and matrix-sdk-crypto is the Matrix encryption library. Prior to version 0.6, when a user requests a room key from their devices, the software correctly remembers the request. When the user receives a forwarded room key, the software accepts it without checking who the room key came from. This allows homeservers to try to insert room keys of questionable validity, potentially mounting an impersonation attack. Version 0.6 fixes this issue. ### CVSS Metrics - **CVSS Base Score**: 8.6/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N` ### Weakness Classification (CWE) - CWE-322: Security Weakness - CWE-287: Improper Authentication ### Affected Products **matrix-org - matrix-rust-sdk** Affected versions: - < 0.6 (Status: affected) ### References 1. [](https://github.com/matrix-org/matrix-rust-sdk/security/advisories/GHSA-vp68-2wrm-69qm) 2. [](https://github.com/matrix-org/matrix-rust-sdk/commit/093fb5d0aa21c0b5eaea6ec96b477f1075271cbb) 3. [](https://github.com/matrix-org/matrix-rust-sdk/commit/41449d2cc360e347f5d4e1c154ec1e3185f11acd) 4. [](https://github.com/matrix-org/matrix-rust-sdk/releases/tag/matrix-sdk-0.6.0)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2005-1109, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2005-1109 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2005-1109 - **State**: PUBLISHED - **Published Date**: April 16, 2005 at 04:00 UTC - **Last Updated**: August 07, 2024 at 21:35 UTC - **Reserved Date**: April 16, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description The filtering of URLs in JunkBuster before 2.0.2-r3 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via heap corruption. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [GLSA-200504-11](http://www.gentoo.org/security/en/glsa/glsa-200504-11.xml) 2. [](http://bugs.gentoo.org/show_bug.cgi?id=88537) 3. [15503](http://www.osvdb.org/15503) 4. [14932](http://secunia.com/advisories/14932/) 5. [junkbuster-heap-corruption(20094)](https://exchange.xforce.ibmcloud.com/vulnerabilities/20094) 6. [13146](http://www.securityfocus.com/bid/13146) 7. [DSA-713](http://www.debian.org/security/2005/dsa-713)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-4823, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-4823 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-4823 - **State**: PUBLISHED - **Published Date**: April 27, 2010 at 15:00 UTC - **Last Updated**: August 07, 2024 at 07:17 UTC - **Reserved Date**: April 27, 2010 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in frontend/x3/files/fileop.html in cPanel 11.0 through 11.24.7 allows remote attackers to inject arbitrary web script or HTML via the fileop parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [37826](http://secunia.com/advisories/37826) 2. [10519](http://www.exploit-db.com/exploits/10519) 3. [ADV-2009-3608](http://www.vupen.com/english/advisories/2009/3608) 4. [37394](http://www.securityfocus.com/bid/37394) 5. [61231](http://osvdb.org/61231) 6. [](http://www.cpanel.net/2009/12/cpanel-cross-site-scripting-vulnerability.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-28112, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-28112 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-28112 - **State**: PUBLISHED - **Published Date**: March 17, 2023 at 18:35 UTC - **Last Updated**: February 25, 2025 at 14:54 UTC - **Reserved Date**: March 10, 2023 at 18:34 UTC - **Assigned By**: GitHub_M ### Vulnerability Description Discourse is an open-source discussion platform. Prior to version 3.1.0.beta3 of the `beta` and `tests-passed` branches, some user provided URLs were being passed to FastImage without SSRF protection. Insufficient protections could enable attackers to trigger outbound network connections from the Discourse server to private IP addresses. This affects any site running the `tests-passed` or `beta` branches versions 3.1.0.beta2 and prior. This issue is patched in version 3.1.0.beta3 of the `beta` and `tests-passed` branches. There are no known workarounds. ### CVSS Metrics - **CVSS Base Score**: 5.9/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N` ### Weakness Classification (CWE) - CWE-918: Server-Side Request Forgery (SSRF) ### Affected Products **discourse - discourse** Affected versions: - beta < 3.1.0.beta3 (Status: affected) - tests-passed < 3.1.0.beta3 (Status: affected) ### References 1. [https://github.com/discourse/discourse/security/advisories/GHSA-9897-x229-55gh](https://github.com/discourse/discourse/security/advisories/GHSA-9897-x229-55gh) 2. [https://github.com/discourse/discourse/pull/20710](https://github.com/discourse/discourse/pull/20710) 3. [https://github.com/discourse/discourse/commit/39c2f63b35d90ebaf67b9604cf1d424e5984203c](https://github.com/discourse/discourse/commit/39c2f63b35d90ebaf67b9604cf1d424e5984203c)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-11525, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-11525 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-11525 - **State**: PUBLISHED - **Published Date**: May 15, 2020 at 16:16 UTC - **Last Updated**: August 04, 2024 at 11:35 UTC - **Reserved Date**: April 04, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description libfreerdp/cache/bitmap.c in FreeRDP versions > 1.0 through 2.0.0-rc4 has an Out of bounds read. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/FreeRDP/FreeRDP/commits/master) 2. [](https://github.com/FreeRDP/FreeRDP/pull/6019/commits/58dc36b3c883fd460199cedb6d30e58eba58298c) 3. [](https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-9755-fphh-gmjg) 4. [](https://pub.freerdp.com/cve/CVE-2020-11525/pocAnalysis_1.pdf) 5. [USN-4379-1](https://usn.ubuntu.com/4379-1/) 6. [USN-4382-1](https://usn.ubuntu.com/4382-1/) 7. [openSUSE-SU-2020:1090](http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html) 8. [[debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update](https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-1943, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-1943 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-1943 - **State**: PUBLISHED - **Published Date**: May 14, 2008 at 18:00 UTC - **Last Updated**: August 07, 2024 at 08:41 UTC - **Reserved Date**: April 24, 2008 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description Buffer overflow in the backend of XenSource Xen Para Virtualized Frame Buffer (PVFB) 3.0 through 3.1.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted description of a shared framebuffer. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [RHSA-2008:0194](http://www.redhat.com/support/errata/RHSA-2008-0194.html) 2. [29183](http://www.securityfocus.com/bid/29183) 3. [1020008](http://www.securitytracker.com/id?1020008) 4. [xen-pvfb-description-dos(42387)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42387) 5. [29963](http://secunia.com/advisories/29963) 6. [oval:org.mitre.oval:def:10338](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10338) 7. [30781](http://secunia.com/advisories/30781) 8. [](https://bugzilla.redhat.com/show_bug.cgi?id=443078) 9. [ADV-2008-1900](http://www.vupen.com/english/advisories/2008/1900/references)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-3161, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-3161 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-3161 - **State**: PUBLISHED - **Published Date**: June 22, 2006 at 22:00 UTC - **Last Updated**: August 07, 2024 at 18:16 UTC - **Reserved Date**: June 22, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in misc.php in SaphpLesson 1.1 and earlier allows remote attackers to execute arbitrary SQL commands via the action parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [1016342](http://securitytracker.com/id?1016342) 2. [1123](http://securityreason.com/securityalert/1123) 3. [20060619 SaphpLesson<<--1.1 "misc.php" SQL injection](http://www.securityfocus.com/archive/1/437659/100/0/threaded) 4. [18501](http://www.securityfocus.com/bid/18501) 5. [saphplesson-misc-sql-injection(27304)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27304)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-6001, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-6001 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-6001 - **State**: PUBLISHED - **Published Date**: November 15, 2007 at 22:00 UTC - **Last Updated**: August 07, 2024 at 15:47 UTC - **Reserved Date**: November 15, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in index.php in Bandersnatch 0.4 allow remote attackers to inject arbitrary web script or HTML via the (1) func or (2) date parameter, or the jid parameter in a (3) log or (4) user action, a different vulnerability than CVE-2007-3910. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [bandersnatch-index-xss(38360)](https://exchange.xforce.ibmcloud.com/vulnerabilities/38360) 2. [](http://www.portcullis-security.com/180.php) 3. [26553](http://www.securityfocus.com/bid/26553)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-23105, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-23105 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-23105 - **State**: REJECTED - **Last Updated**: December 30, 2022 at 00:00 UTC - **Reserved Date**: January 06, 2021 at 00:00 UTC - **Assigned By**: f5 ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-6699, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-6699 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-6699 - **State**: PUBLISHED - **Published Date**: December 23, 2006 at 01:00 UTC - **Last Updated**: August 07, 2024 at 20:33 UTC - **Reserved Date**: December 22, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple CRLF injection vulnerabilities in Oracle Portal 9.0.2 and possibly other versions allow remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the enc parameter to (1) calendarDialog.jsp or (2) fred.jsp. NOTE: the calendar.jsp vector is covered by CVE-2006-6697. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [20061221 Re: Oracle Portal 10g HTTP Response Splitting](http://www.securityfocus.com/archive/1/455106/100/0/threaded)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-31662, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-31662 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-31662 - **State**: PUBLISHED - **Published Date**: August 05, 2022 at 15:05 UTC - **Last Updated**: August 03, 2024 at 07:26 UTC - **Reserved Date**: May 25, 2022 at 00:00 UTC - **Assigned By**: vmware ### Vulnerability Description VMware Workspace ONE Access, Identity Manager, Connectors and vRealize Automation contain a path traversal vulnerability. A malicious actor with network access may be able to access arbitrary files. ### Affected Products **n/a - VMware Workspace ONE Access, Access Connector, Identity Manager, vIDM Connector and vRealize Automation** Affected versions: - Workspace One Access (21.08.0.1 & 21.08.0.0), Access Connector (21.08.0.1, 21.08.0.0, 22.05), Identity Manager (vIDM) (3.3.6, 3.3.5 & 3.3.4), vIDM Connector (3.3.6, 3.3.5, 3.3.4), and vRealize Automation 7.6 (Status: affected) ### References 1. [](https://www.vmware.com/security/advisories/VMSA-2022-0021.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-33997, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-33997 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-33997 - **State**: PUBLISHED - **Published Date**: May 31, 2024 at 19:38 UTC - **Last Updated**: November 21, 2024 at 15:01 UTC - **Reserved Date**: April 29, 2024 at 13:02 UTC - **Assigned By**: fedora ### Vulnerability Description Additional sanitizing was required when opening the equation editor to prevent a stored XSS risk when editing another user's equation. ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Unknown - Unknown** Affected versions: - 4.0 (Status: affected) - 4.2 (Status: affected) - 4.1 (Status: affected) ### References 1. [](https://moodle.org/mod/forum/discuss.php?d=458385) ### Credits - Aleksey Solovev
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-21138, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-21138 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-21138 - **State**: PUBLISHED - **Published Date**: February 09, 2021 at 13:56 UTC - **Last Updated**: August 03, 2024 at 18:01 UTC - **Reserved Date**: December 21, 2020 at 00:00 UTC - **Assigned By**: Chrome ### Vulnerability Description Use after free in DevTools in Google Chrome prior to 88.0.4324.96 allowed a local attacker to potentially perform a sandbox escape via a crafted file. ### Affected Products **Google - Chrome** Affected versions: - unspecified (Status: affected) ### References 1. [](https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop_19.html) 2. [](https://crbug.com/1122487)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-54453, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-54453 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-54453 - **State**: PUBLISHED - **Published Date**: December 27, 2024 at 00:00 UTC - **Last Updated**: December 31, 2024 at 18:38 UTC - **Reserved Date**: December 02, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in Kurmi Provisioning Suite before 7.9.0.35, 7.10.x through 7.10.0.18, and 7.11.x through 7.11.0.15. A path traversal vulnerability in the DocServlet servlet allows remote attackers to retrieve any file from the Kurmi web application installation folder, e.g., files such as the obfuscated and/or compiled Kurmi source code. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://kurmi-software.com) 2. [](https://kurmi-software.com/cve/cve-2024-54453/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-27944, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-27944 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-27944 - **State**: PUBLISHED - **Published Date**: April 02, 2021 at 17:37 UTC - **Last Updated**: August 04, 2024 at 16:25 UTC - **Reserved Date**: October 27, 2020 at 00:00 UTC - **Assigned By**: apple ### Vulnerability Description A memory corruption issue existed in the processing of font files. This issue was addressed with improved input validation. This issue is fixed in watchOS 7.2, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, iOS 14.3 and iPadOS 14.3, tvOS 14.3. Processing a maliciously crafted font file may lead to arbitrary code execution. ### Affected Products **Apple - iOS and iPadOS** Affected versions: - unspecified (Status: affected) **Apple - tvOS** Affected versions: - unspecified (Status: affected) **Apple - watchOS** Affected versions: - unspecified (Status: affected) **Apple - macOS** Affected versions: - unspecified (Status: affected) ### References 1. [](https://support.apple.com/en-us/HT212011) 2. [](https://support.apple.com/en-us/HT212003) 3. [](https://support.apple.com/en-us/HT212005) 4. [](https://support.apple.com/en-us/HT212009)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-29163, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-29163 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-29163 - **State**: PUBLISHED - **Published Date**: May 09, 2024 at 16:25 UTC - **Last Updated**: February 13, 2025 at 15:47 UTC - **Reserved Date**: March 18, 2024 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description HDF5 through 1.14.3 contains a heap buffer overflow in H5T__bit_find, resulting in the corruption of the instruction pointer and causing denial of service or potential code execution. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.hdfgroup.org/2024/05/new-hdf5-cve-issues-fixed-in-1-14-4/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-3802, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-3802 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-3802 - **State**: PUBLISHED - **Published Date**: November 29, 2021 at 00:00 UTC - **Last Updated**: August 03, 2024 at 17:09 UTC - **Reserved Date**: September 15, 2021 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description A vulnerability found in udisks2. This flaw allows an attacker to input a specially crafted image file/USB leading to kernel panic. The highest threat from this vulnerability is to system availability. ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **n/a - udisks2** Affected versions: - udisks-2.9.4 (Status: affected) ### References 1. [](https://bugzilla.redhat.com/show_bug.cgi?id=2003649) 2. [](https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-045.txt) 3. [[debian-lts-announce] 20230407 [SECURITY] [DLA 3387-1] udisks2 security update](https://lists.debian.org/debian-lts-announce/2023/04/msg00009.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-6962, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-6962 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-6962 - **State**: PUBLISHED - **Published Date**: January 24, 2020 at 16:07 UTC - **Last Updated**: August 04, 2024 at 09:18 UTC - **Reserved Date**: January 14, 2020 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description In ApexPro Telemetry Server, Versions 4.2 and prior, CARESCAPE Telemetry Server v4.2 & prior, Clinical Information Center (CIC) Versions 4.X and 5.X, CARESCAPE Telemetry Server Version 4.3, CARESCAPE Central Station (CSCS) Versions 1.X CARESCAPE Central Station (CSCS) Versions 2.X, B450 Version 2.X, B650 Version 1.X, B650 Version 2.X, B850 Version 1.X, B850 Version 2.X, an input validation vulnerability exists in the web-based system configuration utility that could allow an attacker to obtain arbitrary remote code execution. ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **n/a - GE CARESCAPE Telemetry Server,ApexPro Telemetry Server,CARESCAPE Central Station,Clinical Information Center,CARESCAPE B450,B650,B850 Monitors** Affected versions: - ApexPro Telemetry Server,v4.2 & prior,CARESCAPE Telemetry Server,v4.2 & prior,Clinical Information Center,v4.X & 5.X,CARESCAPE Telemetry Server,v4.3,CARESCAPE Central Station,v1.X,CARESCAPE Central Station,v2.X,B450,v2.X,B650,v1.X,B650,v2.X,B850,v1.X,B850,v2.X (Status: affected) ### References 1. [](https://www.us-cert.gov/ics/advisories/icsma-20-023-01)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-13518, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-13518 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-13518 - **State**: PUBLISHED - **Published Date**: December 17, 2020 at 23:48 UTC - **Last Updated**: August 04, 2024 at 12:18 UTC - **Reserved Date**: May 26, 2020 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description An information disclosure vulnerability exists in the WinRing0x64 Driver IRP 0x9c402084 functionality of NZXT CAM 4.8.0. A specially crafted I/O request packet (IRP) can cause the disclosure of sensitive information. An attacker can send a malicious IRP to trigger this vulnerability. ### Weakness Classification (CWE) - CWE-269: Security Weakness ### Affected Products **n/a - NZXT** Affected versions: - NZXT CAM 4.8.0 (Status: affected) ### References 1. [](https://talosintelligence.com/vulnerability_reports/TALOS-2020-1115)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-2840, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-2840 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-2840 - **State**: PUBLISHED - **Published Date**: April 24, 2018 at 19:00 UTC - **Last Updated**: September 16, 2024 at 18:19 UTC - **Reserved Date**: December 01, 2016 at 00:00 UTC - **Assigned By**: talos ### Vulnerability Description A buffer overflow vulnerability exists in the ISO parsing functionality of EZB Systems UltraISO 9.6.6.3300. A specially crafted .ISO file can cause a vulnerability resulting in potential code execution. An attacker can provide a specific .ISO file to trigger this vulnerability. ### Affected Products **EZB Systems - UltraISO** Affected versions: - 9.6.6.3300 (Status: affected) ### References 1. [100084](http://www.securityfocus.com/bid/100084) 2. [](https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0342)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-30613, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-30613 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-30613 - **State**: PUBLISHED - **Published Date**: April 01, 2025 at 05:31 UTC - **Last Updated**: April 01, 2025 at 13:24 UTC - **Reserved Date**: March 24, 2025 at 13:00 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in N-Media Nmedia MailChimp allows Stored XSS. This issue affects Nmedia MailChimp: from n/a through 5.4. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **N-Media - Nmedia MailChimp** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/nmedia-mailchimp-widget/vulnerability/wordpress-nmedia-mailchimp-5-4-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Nguyen Thi Huyen Trang - Skalucy (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-1551, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-1551 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-1551 - **State**: PUBLISHED - **Published Date**: April 17, 2013 at 12:10 UTC - **Last Updated**: August 06, 2024 at 15:04 UTC - **Reserved Date**: January 30, 2013 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the Siebel Enterprise Application Integration component in Oracle Siebel CRM 8.1.1 and 8.2.2 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Integration Business Services. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html) 2. [MDVSA-2013:150](http://www.mandriva.com/security/advisories?name=MDVSA-2013:150)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-0062, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-0062 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-0062 - **State**: PUBLISHED - **Published Date**: October 09, 2019 at 19:26 UTC - **Last Updated**: September 16, 2024 at 22:50 UTC - **Reserved Date**: October 11, 2018 at 00:00 UTC - **Assigned By**: juniper ### Vulnerability Description A session fixation vulnerability in J-Web on Junos OS may allow an attacker to use social engineering techniques to fix and hijack a J-Web administrators web session and potentially gain administrative access to the device. This issue affects: Juniper Networks Junos OS 12.3 versions prior to 12.3R12-S15 on EX Series; 12.3X48 versions prior to 12.3X48-D85 on SRX Series; 14.1X53 versions prior to 14.1X53-D51; 15.1 versions prior to 15.1F6-S13, 15.1R7-S5; 15.1X49 versions prior to 15.1X49-D180 on SRX Series; 15.1X53 versions prior to 15.1X53-D238; 16.1 versions prior to 16.1R4-S13, 16.1R7-S5; 16.2 versions prior to 16.2R2-S10; 17.1 versions prior to 17.1R3-S1; 17.2 versions prior to 17.2R2-S8, 17.2R3-S3; 17.3 versions prior to 17.3R3-S5; 17.4 versions prior to 17.4R2-S8, 17.4R3; 18.1 versions prior to 18.1R3-S8; 18.2 versions prior to 18.2R3; 18.3 versions prior to 18.3R3; 18.4 versions prior to 18.4R2; 19.1 versions prior to 19.1R1-S2, 19.1R2. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-384: Security Weakness ### Affected Products **Juniper Networks - Junos OS** Affected versions: - 12.3 (Status: affected) **Juniper Networks - Junos OS** Affected versions: - 12.3X48 (Status: affected) - 15.1X49 (Status: affected) **Juniper Networks - Junos OS** Affected versions: - 14.1X53 (Status: affected) - 15.1 (Status: affected) - 15.1X53 (Status: affected) - 16.1 (Status: affected) - 16.2 (Status: affected) - 17.1 (Status: affected) - 17.2 (Status: affected) - 17.3 (Status: affected) - 17.4 (Status: affected) - 18.1 (Status: affected) - 18.2 (Status: affected) - 18.3 (Status: affected) - 18.4 (Status: affected) - 19.1 (Status: affected) ### References 1. [](https://kb.juniper.net/JSA10961) ### Credits - Farid Heydari
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-5473, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-5473 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-5473 - **State**: PUBLISHED - **Published Date**: June 26, 2024 at 06:00 UTC - **Last Updated**: August 01, 2024 at 21:11 UTC - **Reserved Date**: May 29, 2024 at 13:41 UTC - **Assigned By**: WPScan ### Vulnerability Description The Simple Photoswipe WordPress plugin through 0.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). ### Weakness Classification (CWE) - CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS) ### Affected Products **Unknown - Simple Photoswipe** Affected versions: - 0 (Status: affected) ### References 1. [](https://wpscan.com/vulnerability/9c70cfc4-5759-469a-a6a3-510c405bd28a/) ### Credits - Felipe Caon - WPScan
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2012-4431, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2012-4431 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2012-4431 - **State**: PUBLISHED - **Published Date**: December 19, 2012 at 11:00 UTC - **Last Updated**: August 06, 2024 at 20:35 UTC - **Reserved Date**: August 21, 2012 at 00:00 UTC - **Assigned By**: redhat ### Vulnerability Description org/apache/catalina/filters/CsrfPreventionFilter.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.32 allows remote attackers to bypass the cross-site request forgery (CSRF) protection mechanism via a request that lacks a session identifier. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [oval:org.mitre.oval:def:18541](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18541) 2. [SSRT101139](http://marc.info/?l=bugtraq&m=136612293908376&w=2) 3. [20121204 CVE-2012-4431 Apache Tomcat Bypass of CSRF prevention filter](http://archives.neohapsis.com/archives/bugtraq/2012-12/0045.html) 4. [openSUSE-SU-2013:0161](http://lists.opensuse.org/opensuse-updates/2013-01/msg00051.html) 5. [USN-1685-1](http://www.ubuntu.com/usn/USN-1685-1) 6. [openSUSE-SU-2012:1700](http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html) 7. [56814](http://www.securityfocus.com/bid/56814) 8. [openSUSE-SU-2013:0192](http://lists.opensuse.org/opensuse-updates/2013-01/msg00080.html) 9. [SSRT101182](https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03748878) 10. [RHSA-2013:0268](http://rhn.redhat.com/errata/RHSA-2013-0268.html) 11. [](http://tomcat.apache.org/security-7.html) 12. [RHSA-2013:0648](http://rhn.redhat.com/errata/RHSA-2013-0648.html) 13. [1027834](http://www.securitytracker.com/id?1027834) 14. [RHSA-2013:1437](http://rhn.redhat.com/errata/RHSA-2013-1437.html) 15. [HPSBMU02873](https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03748878) 16. [](http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/java/org/apache/catalina/filters/CsrfPreventionFilter.java?r1=1393088&r2=1393087&pathrev=1393088) 17. [RHSA-2013:0647](http://rhn.redhat.com/errata/RHSA-2013-0647.html) 18. [](http://tomcat.apache.org/security-6.html) 19. [57126](http://secunia.com/advisories/57126) 20. [RHSA-2013:1853](http://rhn.redhat.com/errata/RHSA-2013-1853.html) 21. [openSUSE-SU-2013:0147](http://lists.opensuse.org/opensuse-updates/2013-01/msg00037.html) 22. [](http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/webapps/docs/changelog.xml?r1=1393088&r2=1393087&pathrev=1393088) 23. [RHSA-2013:0267](http://rhn.redhat.com/errata/RHSA-2013-0267.html) 24. [](http://svn.apache.org/viewvc?view=revision&revision=1393088) 25. [HPSBUX02866](http://marc.info/?l=bugtraq&m=136612293908376&w=2) 26. [HPSBST02955](http://marc.info/?l=bugtraq&m=139344343412337&w=2) 27. [openSUSE-SU-2012:1701](http://lists.opensuse.org/opensuse-updates/2012-12/msg00090.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-5102, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-5102 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-5102 - **State**: PUBLISHED - **Published Date**: June 11, 2018 at 21:00 UTC - **Last Updated**: August 05, 2024 at 05:26 UTC - **Reserved Date**: January 03, 2018 at 00:00 UTC - **Assigned By**: mozilla ### Vulnerability Description A use-after-free vulnerability can occur when manipulating HTML media elements with media streams, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58. ### Affected Products **Mozilla - Thunderbird** Affected versions: - unspecified (Status: affected) **Mozilla - Firefox ESR** Affected versions: - unspecified (Status: affected) **Mozilla - Firefox** Affected versions: - unspecified (Status: affected) ### References 1. [](https://www.mozilla.org/security/advisories/mfsa2018-03/) 2. [1040270](http://www.securitytracker.com/id/1040270) 3. [[debian-lts-announce] 20180129 [SECURITY] [DLA 1262-1] thunderbird security update](https://lists.debian.org/debian-lts-announce/2018/01/msg00036.html) 4. [102783](http://www.securityfocus.com/bid/102783) 5. [DSA-4096](https://www.debian.org/security/2018/dsa-4096) 6. [RHSA-2018:0262](https://access.redhat.com/errata/RHSA-2018:0262) 7. [USN-3544-1](https://usn.ubuntu.com/3544-1/) 8. [](https://www.mozilla.org/security/advisories/mfsa2018-04/) 9. [RHSA-2018:0122](https://access.redhat.com/errata/RHSA-2018:0122) 10. [](https://www.mozilla.org/security/advisories/mfsa2018-02/) 11. [[debian-lts-announce] 20180124 [SECURITY] [DLA 1256-1] firefox-esr security update](https://lists.debian.org/debian-lts-announce/2018/01/msg00030.html) 12. [DSA-4102](https://www.debian.org/security/2018/dsa-4102) 13. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1419363)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-0513, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-0513 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-0513 - **State**: PUBLISHED - **Published Date**: February 11, 2025 at 10:27 UTC - **Last Updated**: February 11, 2025 at 14:41 UTC - **Reserved Date**: January 16, 2025 at 06:52 UTC - **Assigned By**: Octopus ### Vulnerability Description In affected versions of Octopus Server error messages were handled unsafely on the error page. If an adversary could control any part of the error message they could embed code which may impact the user viewing the error message. ### Affected Products **Octopus Deploy - Octopus Server** Affected versions: - 2024.3.164 (Status: affected) - 2024.4.401 (Status: affected) ### References 1. [](https://advisories.octopus.com/post/2024/sa2025-04/) ### Credits - This vulnerability was found by Edward Prior (@JankhJankh)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-2188, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-2188 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-2188 - **State**: PUBLISHED - **Published Date**: May 06, 2020 at 12:45 UTC - **Last Updated**: August 04, 2024 at 07:01 UTC - **Reserved Date**: December 05, 2019 at 00:00 UTC - **Assigned By**: jenkins ### Vulnerability Description A missing permission check in Jenkins Amazon EC2 Plugin 1.50.1 and earlier in form-related methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins. ### Affected Products **Jenkins project - Jenkins Amazon EC2 Plugin** Affected versions: - unspecified (Status: affected) ### References 1. [](https://jenkins.io/security/advisory/2020-05-06/#SECURITY-1844) 2. [[oss-security] 20200506 Multiple vulnerabilities in Jenkins plugins](http://www.openwall.com/lists/oss-security/2020/05/06/3)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-7194, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-7194 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-7194 - **State**: PUBLISHED - **Published Date**: September 10, 2009 at 10:00 UTC - **Last Updated**: August 07, 2024 at 11:56 UTC - **Reserved Date**: September 09, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Unspecified vulnerability in Fujitsu Interstage HTTP Server, as used in Interstage Application Server 5.0, 7.0, 7.0.1, and 8.0.0 for Windows, allows attackers to cause a denial of service via a crafted request. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [28606](http://secunia.com/advisories/28606) 2. [27391](http://www.securityfocus.com/bid/27391) 3. [interstagehttpserver-requests-dos(39847)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39847) 4. [ADV-2008-0233](http://www.vupen.com/english/advisories/2008/0233) 5. [](http://www.fujitsu.com/global/support/software/security/products-f/interstage-200802e.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2019-4888, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2019-4888 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2019-4888 - **State**: REJECTED - **Published Date**: December 30, 2019 at 16:19 UTC - **Last Updated**: December 30, 2019 at 16:19 UTC - **Reserved Date**: January 03, 2019 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-32685, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-32685 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-32685 - **State**: PUBLISHED - **Published Date**: May 17, 2024 at 08:59 UTC - **Last Updated**: August 02, 2024 at 02:20 UTC - **Reserved Date**: April 17, 2024 at 08:55 UTC - **Assigned By**: Patchstack ### Vulnerability Description Client-Side Enforcement of Server-Side Security vulnerability in Wpmet Wp Ultimate Review allows Functionality Bypass.This issue affects Wp Ultimate Review: from n/a through 2.2.5. ### CVSS Metrics - **CVSS Base Score**: 5.3/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N` ### Weakness Classification (CWE) - CWE-602: Security Weakness ### Affected Products **Wpmet - Wp Ultimate Review** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/wp-ultimate-review/wordpress-wp-ultimate-review-plugin-2-2-5-review-score-manipulation-vulnerability?_s_id=cve) ### Credits - Kyle Sanchez (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2023-34131, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2023-34131 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2023-34131 - **State**: PUBLISHED - **Published Date**: July 13, 2023 at 02:20 UTC - **Last Updated**: October 30, 2024 at 19:18 UTC - **Reserved Date**: May 25, 2023 at 22:45 UTC - **Assigned By**: sonicwall ### Vulnerability Description Exposure of sensitive information to an unauthorized actor vulnerability in SonicWall GMS and Analytics enables an unauthenticated attacker to access restricted web pages. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions. ### Weakness Classification (CWE) - CWE-200: Improper Input Validation ### Affected Products **SonicWall - GMS** Affected versions: - 9.3.2-SP1 and earlier versions (Status: affected) **SonicWall - Analytics** Affected versions: - 2.5.0.4-R7 and earlier versions (Status: affected) ### References 1. [](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010) 2. [](https://www.sonicwall.com/support/notices/230710150218060)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-31901, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-31901 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-31901 - **State**: PUBLISHED - **Published Date**: April 03, 2025 at 13:27 UTC - **Last Updated**: April 03, 2025 at 15:04 UTC - **Reserved Date**: April 01, 2025 at 13:21 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Digihood Digihood HTML Sitemap allows Reflected XSS. This issue affects Digihood HTML Sitemap: from n/a through 3.1.1. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **Digihood - Digihood HTML Sitemap** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/wordpress/plugin/wedesin-html-sitemap/vulnerability/wordpress-digihood-html-sitemap-plugin-3-1-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - João Pedro S Alcântara (Kinorth) (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-3752, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-3752 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-3752 - **State**: PUBLISHED - **Published Date**: August 09, 2017 at 21:00 UTC - **Last Updated**: September 16, 2024 at 23:36 UTC - **Reserved Date**: December 16, 2016 at 00:00 UTC - **Assigned By**: lenovo ### Vulnerability Description An industry-wide vulnerability has been identified in the implementation of the Open Shortest Path First (OSPF) routing protocol used on some Lenovo switches. Exploitation of these implementation flaws may result in attackers being able to erase or alter the routing tables of one or many routers, switches, or other devices that support OSPF within a routing domain. ### Affected Products **Lenovo Group Ltd. - Lenovo and IBM Switch Products** Affected versions: - Various (Status: affected) ### References 1. [](https://support.lenovo.com/us/en/product_security/LEN-14078) 2. [99995](http://www.securityfocus.com/bid/99995)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-7670, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-7670 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-7670 - **State**: PUBLISHED - **Published Date**: June 10, 2020 at 15:36 UTC - **Last Updated**: August 04, 2024 at 09:41 UTC - **Reserved Date**: January 21, 2020 at 00:00 UTC - **Assigned By**: snyk ### Vulnerability Description agoo prior to 2.14.0 allows request smuggling attacks where agoo is used as a backend and a frontend proxy also being vulnerable. HTTP pipelining issues and request smuggling attacks might be possible due to incorrect Content-Length and Transfer encoding header parsing. It is possible to conduct HTTP request smuggling attacks where `agoo` is used as part of a chain of backend servers due to insufficient `Content-Length` and `Transfer Encoding` parsing. ### Affected Products **n/a - agoo** Affected versions: - versions prior to 2.14.0 (Status: affected) ### References 1. [](https://snyk.io/vuln/SNYK-RUBY-AGOO-569137) 2. [](https://github.com/ohler55/agoo/issues/88) 3. [](https://github.com/ohler55/agoo/commit/23d03535cf7b50d679a60a953a0cae9519a4a130)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2016-6632, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2016-6632 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2016-6632 - **State**: PUBLISHED - **Published Date**: December 11, 2016 at 02:00 UTC - **Last Updated**: August 06, 2024 at 01:36 UTC - **Reserved Date**: August 06, 2016 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in phpMyAdmin where, under certain conditions, phpMyAdmin may not delete temporary files during the import of ESRI files. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [92497](http://www.securityfocus.com/bid/92497) 2. [](https://www.phpmyadmin.net/security/PMASA-2016-55) 3. [GLSA-201701-32](https://security.gentoo.org/glsa/201701-32) 4. [[debian-lts-announce] 20190617 [SECURITY] [DLA 1821-1] phpmyadmin security update](https://lists.debian.org/debian-lts-announce/2019/06/msg00009.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-1000202, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-1000202 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-1000202 - **State**: PUBLISHED - **Published Date**: June 05, 2018 at 21:00 UTC - **Last Updated**: September 17, 2024 at 01:35 UTC - **Reserved Date**: June 05, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A persisted cross-site scripting vulnerability exists in Jenkins Groovy Postbuild Plugin 2.3.1 and older in various Jelly files that allows attackers able to control build badge content to define JavaScript that would be executed in another user's browser when that other user performs some UI actions. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://jenkins.io/security/advisory/2018-05-09/#SECURITY-821)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-35140, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-35140 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-35140 - **State**: PUBLISHED - **Published Date**: May 31, 2024 at 16:53 UTC - **Last Updated**: August 02, 2024 at 03:07 UTC - **Reserved Date**: May 09, 2024 at 16:27 UTC - **Assigned By**: ibm ### Vulnerability Description IBM Security Verify Access Docker 10.0.0 through 10.0.6 could allow a local user to escalate their privileges due to improper certificate validation. IBM X-Force ID: 292416. ### CVSS Metrics - **CVSS Base Score**: 7.7/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N` ### Weakness Classification (CWE) - CWE-295: Security Weakness ### Affected Products **IBM - Security Verify Access Docker** Affected versions: - 10.0.0 (Status: affected) ### References 1. [](https://www.ibm.com/support/pages/node/7155356) 2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/292416) ### Credits - Pierre Barre
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-1362, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-1362 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-1362 - **State**: PUBLISHED - **Published Date**: September 01, 2004 at 04:00 UTC - **Last Updated**: August 08, 2024 at 03:19 UTC - **Reserved Date**: December 14, 2002 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description mICQ 0.4.9 and earlier allows remote attackers to cause a denial of service (crash) via malformed ICQ message types without a 0xFE separator character. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [RHSA-2003:118](http://www.redhat.com/support/errata/RHSA-2003-118.html) 2. [micq-0xfe-dos(10872)](https://exchange.xforce.ibmcloud.com/vulnerabilities/10872) 3. [6392](http://www.securityfocus.com/bid/6392) 4. [DSA-211](http://www.debian.org/security/2002/dsa-211)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-0651, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-0651 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-0651 - **State**: PUBLISHED - **Published Date**: February 07, 2008 at 20:00 UTC - **Last Updated**: September 16, 2024 at 22:08 UTC - **Reserved Date**: February 07, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description SQL injection vulnerability in login.php in Pedro Santana Codice CMS allows remote attackers to execute arbitrary SQL commands via the username field. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [27592](http://www.securityfocus.com/bid/27592)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-4097, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-4097 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-4097 - **State**: REJECTED - **Published Date**: March 16, 2018 at 14:04 UTC - **Last Updated**: March 16, 2018 at 13:57 UTC - **Reserved Date**: December 26, 2016 at 00:00 UTC - **Assigned By**: intel ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-30970, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-30970 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-30970 - **State**: PUBLISHED - **Published Date**: May 17, 2022 at 14:06 UTC - **Last Updated**: August 03, 2024 at 07:03 UTC - **Reserved Date**: May 16, 2022 at 00:00 UTC - **Assigned By**: jenkins ### Vulnerability Description Jenkins Autocomplete Parameter Plugin 1.1 and earlier references Dropdown Autocomplete parameter and Auto Complete String parameter names in an unsafe manner from Javascript embedded in view definitions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. ### Affected Products **Jenkins project - Jenkins Autocomplete Parameter Plugin** Affected versions: - unspecified (Status: affected) - next of 1.1 (Status: unknown) ### References 1. [](https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2267)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-13420, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-13420 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-13420 - **State**: PUBLISHED - **Published Date**: July 07, 2018 at 17:00 UTC - **Last Updated**: November 14, 2024 at 20:41 UTC - **Reserved Date**: July 07, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Google gperftools 2.7 has a memory leak in malloc_extension.cc, related to MallocExtension::Register and InitModule. NOTE: the software maintainer indicates that this is not a bug; it is only a false-positive report from the LeakSanitizer program ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/gperftools/gperftools/issues/1013)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2015-9068, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2015-9068 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2015-9068 - **State**: PUBLISHED - **Published Date**: August 18, 2017 at 18:00 UTC - **Last Updated**: September 16, 2024 at 16:22 UTC - **Reserved Date**: May 30, 2017 at 00:00 UTC - **Assigned By**: qualcomm ### Vulnerability Description In all Qualcomm products with Android releases from CAF using the Linux kernel, an argument to a mink syscall is not properly validated. ### Affected Products **Qualcomm, Inc. - All Qualcomm products** Affected versions: - All Android releases from CAF using the Linux kernel (Status: affected) ### References 1. [](https://source.android.com/security/bulletin/2017-07-01) 2. [99467](http://www.securityfocus.com/bid/99467)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-37487, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-37487 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-37487 - **State**: PUBLISHED - **Published Date**: July 21, 2024 at 07:32 UTC - **Last Updated**: August 02, 2024 at 03:57 UTC - **Reserved Date**: June 09, 2024 at 11:43 UTC - **Assigned By**: Patchstack ### Vulnerability Description Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in wpdirectorykit.Com WP Directory Kit allows Reflected XSS.This issue affects WP Directory Kit: from n/a through 1.3.5. ### CVSS Metrics - **CVSS Base Score**: 7.1/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **wpdirectorykit.com - WP Directory Kit** Affected versions: - n/a (Status: affected) ### References 1. [](https://patchstack.com/database/vulnerability/wpdirectorykit/wordpress-wp-directory-kit-plugin-1-3-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve) ### Credits - Dimas Maulana (Patchstack Alliance)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-2396, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-2396 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-2396 - **State**: PUBLISHED - **Published Date**: May 21, 2008 at 10:00 UTC - **Last Updated**: August 07, 2024 at 08:58 UTC - **Reserved Date**: May 21, 2008 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description PHP remote file inclusion vulnerability in index.php in Wajox Software microSSys CMS 1.5 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in an arbitrary element of the PAGES array parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [5651](https://www.exploit-db.com/exploits/5651) 2. [29278](http://www.securityfocus.com/bid/29278) 3. [30264](http://secunia.com/advisories/30264) 4. [microssys-index-file-include(42518)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42518)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-6550, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-6550 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-6550 - **State**: PUBLISHED - **Published Date**: March 20, 2017 at 16:00 UTC - **Last Updated**: August 05, 2024 at 15:33 UTC - **Reserved Date**: March 08, 2017 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple SQL injection vulnerabilities in Kinsey Infor-Lawson (formerly ESBUS) allow remote attackers to execute arbitrary SQL commands via the (1) TABLE parameter to esbus/servlet/GetSQLData or (2) QUERY parameter to KK_LS9ReportingPortal/GetData. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [96821](http://www.securityfocus.com/bid/96821) 2. [20170310 CVE-2017-6550: Kinsey Infor-Lawson - Multiple SQL Injections](http://seclists.org/fulldisclosure/2017/Mar/31) 3. [](http://packetstormsecurity.com/files/141575/Kinseys-Infor-Lawson-SQL-Injection.html) 4. [41577](https://www.exploit-db.com/exploits/41577/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-1963, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-1963 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-1963 - **State**: PUBLISHED - **Published Date**: June 12, 2024 at 23:02 UTC - **Last Updated**: August 30, 2024 at 13:24 UTC - **Reserved Date**: February 28, 2024 at 00:02 UTC - **Assigned By**: GitLab ### Vulnerability Description An issue has been discovered in GitLab CE/EE affecting all versions starting from 8.4 prior to 16.10.7, starting from 16.11 prior to 16.11.4, and starting from 17.0 prior to 17.0.2. A vulnerability in GitLab's Asana integration allowed an attacker to potentially cause a regular expression denial of service by sending specially crafted requests. ### CVSS Metrics - **CVSS Base Score**: 6.5/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H` ### Weakness Classification (CWE) - CWE-1333: Security Weakness ### Affected Products **GitLab - GitLab** Affected versions: - 8.4 (Status: affected) - 16.11 (Status: affected) - 17.0 (Status: affected) ### References 1. [GitLab Issue #443577](https://gitlab.com/gitlab-org/gitlab/-/issues/443577) 2. [HackerOne Bug Bounty Report #2376482](https://hackerone.com/reports/2376482) 3. [](https://about.gitlab.com/releases/2024/06/12/patch-release-gitlab-17-0-2-released/#redos-in-asana-integration-issue-mapping-when-webhook-is-called) ### Credits - Thanks [joaxcar](https://hackerone.com/joaxcar) for reporting this vulnerability through our HackerOne bug bounty program
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-5841, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-5841 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-5841 - **State**: PUBLISHED - **Published Date**: October 16, 2013 at 17:31 UTC - **Last Updated**: August 06, 2024 at 17:22 UTC - **Reserved Date**: September 18, 2013 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.51, 8.52, and 8.53 allows remote attackers to affect confidentiality via unknown vectors related to Portal, a different vulnerability than CVE-2013-5794. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [63092](http://www.securityfocus.com/bid/63092) 2. [](http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-28443, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-28443 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-28443 - **State**: PUBLISHED - **Published Date**: April 21, 2022 at 19:04 UTC - **Last Updated**: August 03, 2024 at 05:56 UTC - **Reserved Date**: April 04, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description UCMS v1.6 was discovered to contain an arbitrary file deletion vulnerability. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/k0xx11)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2025-4803, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2025-4803 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2025-4803 - **State**: PUBLISHED - **Published Date**: May 21, 2025 at 09:21 UTC - **Last Updated**: May 21, 2025 at 10:15 UTC - **Reserved Date**: May 15, 2025 at 23:37 UTC - **Assigned By**: Wordfence ### Vulnerability Description The Glossary by WPPedia – Best Glossary plugin for WordPress plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.3.0 via deserialization of untrusted input from the 'posttypes' parameter. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present. ### CVSS Metrics - **CVSS Base Score**: 7.2/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-502: Deserialization of Untrusted Data ### Affected Products **steinrein - Glossary by WPPedia – Best Glossary plugin for WordPress** Affected versions: - * (Status: affected) ### References 1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/53fb54bc-6eaa-4e99-a41c-e59a9bae81e5?source=cve) 2. [](https://plugins.trac.wordpress.org/browser/wppedia/tags/1.3.0/core/classes/class-options.php#L396) 3. [](https://plugins.trac.wordpress.org/browser/wppedia/tags/1.3.0/core/classes/traits/trait-sanitizes-data.php#L64) 4. [](https://github.com/bfiessinger/wppedia/blob/1d0b8568349c9c9479372f845a812eb2aa4b3d09/core/classes/traits/trait-sanitizes-data.php#L64) ### Credits - Drew Webber
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-47614, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-47614 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-47614 - **State**: PUBLISHED - **Published Date**: June 19, 2024 at 14:58 UTC - **Last Updated**: May 04, 2025 at 07:14 UTC - **Reserved Date**: June 19, 2024 at 14:55 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: RDMA/irdma: Fix a user-after-free in add_pble_prm When irdma_hmc_sd_one fails, 'chunk' is freed while its still on the PBLE info list. Add the chunk entry to the PBLE info list only after successful setting of the SD in irdma_hmc_sd_one. ### Affected Products **Linux - Linux** Affected versions: - e8c4dbc2fcacf5a7468d312168bb120c27c38b32 (Status: affected) - e8c4dbc2fcacf5a7468d312168bb120c27c38b32 (Status: affected) **Linux - Linux** Affected versions: - 5.14 (Status: affected) - 0 (Status: unaffected) - 5.15.10 (Status: unaffected) - 5.16 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/11eebcf63e98fcf047a876a51d76afdabc3b8b9b) 2. [](https://git.kernel.org/stable/c/1e11a39a82e95ce86f849f40dda0d9c0498cebd9)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-24391, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-24391 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-24391 - **State**: PUBLISHED - **Published Date**: March 30, 2021 at 20:52 UTC - **Last Updated**: August 04, 2024 at 15:12 UTC - **Reserved Date**: August 19, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description mongo-express before 1.0.0 offers support for certain advanced syntax but implements this in an unsafe way. NOTE: this may overlap CVE-2019-10769. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/mongo-express/mongo-express/commit/3a26b079e7821e0e209c3ee0cc2ae15ad467b91a) 2. [](https://github.com/mongodb-js/query-parser/issues/16)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2003-1000, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2003-1000 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2003-1000 - **State**: PUBLISHED - **Published Date**: December 17, 2003 at 05:00 UTC - **Last Updated**: August 08, 2024 at 02:12 UTC - **Reserved Date**: December 16, 2003 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description xchat 2.0.6 allows remote attackers to cause a denial of service (crash) via a passive DCC request with an invalid ID number, which causes a null dereference. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://mail.nl.linux.org/xchat-announce/2003-12/msg00000.html) 2. [20031214 GLSA: Malformed dcc send requests in xchat-2.0.6 lead to a denial of service](http://marc.info/?l=bugtraq&m=107152093419276&w=2)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2009-0533, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2009-0533 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2009-0533 - **State**: PUBLISHED - **Published Date**: February 11, 2009 at 20:00 UTC - **Last Updated**: August 07, 2024 at 04:40 UTC - **Reserved Date**: February 11, 2009 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in password.php in Scripts for Sites EZ Reminder allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, possibly involving the u2 parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ezreminder-password-xss(48548)](https://exchange.xforce.ibmcloud.com/vulnerabilities/48548) 2. [33641](http://www.securityfocus.com/bid/33641) 3. [33989](http://secunia.com/advisories/33989)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-38319, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-38319 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-38319 - **State**: PUBLISHED - **Published Date**: September 09, 2021 at 18:10 UTC - **Last Updated**: May 05, 2025 at 16:39 UTC - **Reserved Date**: August 09, 2021 at 00:00 UTC - **Assigned By**: Wordfence ### Vulnerability Description The More From Google WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to a reflected $_SERVER["PHP_SELF"] value in the ~/morefromgoogle.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.0.2. ### CVSS Metrics - **CVSS Base Score**: 6.1/10.0 - **Severity**: MEDIUM - **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N` ### Weakness Classification (CWE) - CWE-79: Cross-site Scripting (XSS) ### Affected Products **More From Google - More From Google** Affected versions: - 0.0.2 (Status: affected) ### References 1. [](https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38319) 2. [](https://plugins.trac.wordpress.org/browser/more-from-google/trunk/morefromgoogle.php#L397) ### Credits - p7e4
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-15835, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-15835 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-15835 - **State**: PUBLISHED - **Published Date**: February 01, 2021 at 01:42 UTC - **Last Updated**: August 04, 2024 at 13:30 UTC - **Reserved Date**: July 19, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered on Mofi Network MOFI4500-4GXeLTE 4.1.5-std devices. The authentication function contains undocumented code that provides the ability to authenticate as root without knowing the actual root password. An adversary with the private key can remotely authenticate to the management interface as root. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://mofinetwork.com/index.php?main_page=page&id=14) 2. [](https://www.criticalstart.com/critical-vulnerabilities-discovered-in-mofi-routers/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2008-5453, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2008-5453 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2008-5453 - **State**: REJECTED - **Published Date**: May 11, 2017 at 14:01 UTC - **Last Updated**: May 11, 2017 at 13:57 UTC - **Reserved Date**: December 11, 2008 at 00:00 UTC - **Assigned By**: oracle ### Vulnerability Description No description available
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2024-30342, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2024-30342 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2024-30342 - **State**: PUBLISHED - **Published Date**: April 02, 2024 at 20:12 UTC - **Last Updated**: August 12, 2024 at 18:59 UTC - **Reserved Date**: March 26, 2024 at 18:52 UTC - **Assigned By**: zdi ### Vulnerability Description Foxit PDF Reader Annotation Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22720. ### Weakness Classification (CWE) - CWE-416: Use After Free ### Affected Products **Foxit - PDF Reader** Affected versions: - 2023.3.0.23028 (Status: affected) ### References 1. [ZDI-24-322](https://www.zerodayinitiative.com/advisories/ZDI-24-322/) 2. [vendor-provided URL](https://www.foxit.com/support/security-bulletins.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-45629, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-45629 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-45629 - **State**: PUBLISHED - **Published Date**: December 26, 2021 at 00:33 UTC - **Last Updated**: August 04, 2024 at 04:47 UTC - **Reserved Date**: December 25, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects CBR750 before 4.6.3.6, RBK752 before 3.2.17.12, RBR750 before 3.2.17.12, RBS750 before 3.2.17.12, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12. ### CVSS Metrics - **CVSS Base Score**: 9.6/10.0 - **Severity**: CRITICAL - **CVSS Vector**: `CVSS:3.1/AC:L/AV:A/A:H/C:H/I:H/PR:N/S:C/UI:N` ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://kb.netgear.com/000064132/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0488)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2017-1295, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2017-1295 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2017-1295 - **State**: PUBLISHED - **Published Date**: October 25, 2017 at 12:00 UTC - **Last Updated**: September 16, 2024 at 19:57 UTC - **Reserved Date**: November 30, 2016 at 00:00 UTC - **Assigned By**: ibm ### Vulnerability Description IBM RSA DM contains unspecified vulnerability in CLM Applications with potential for information leakage. IBM X-Force ID: 125157. ### Affected Products **IBM - Rational Collaborative Lifecycle Management** Affected versions: - 4.0 (Status: affected) - 4.0.1 (Status: affected) - 4.0.2 (Status: affected) - 4.0.3 (Status: affected) - 4.0.4 (Status: affected) - 4.0.5 (Status: affected) - 4.0.6 (Status: affected) - 5.0 (Status: affected) - 4.0.7 (Status: affected) - 5.0.1 (Status: affected) - 5.0.2 (Status: affected) - 6.0 (Status: affected) - 6.0.1 (Status: affected) - 6.0.2 (Status: affected) - 6.0.3 (Status: affected) - 6.0.4 (Status: affected) ### References 1. [101616](http://www.securityfocus.com/bid/101616) 2. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/125157) 3. [](http://www.ibm.com/support/docview.wss?uid=swg22009296)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-16622, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-16622 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-16622 - **State**: PUBLISHED - **Published Date**: September 06, 2018 at 19:00 UTC - **Last Updated**: September 17, 2024 at 03:33 UTC - **Reserved Date**: September 06, 2018 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Multiple cross-site scripting (XSS) vulnerabilities in /api/content/addOne in DoraCMS v2.0.3 allow remote attackers to inject arbitrary web script or HTML via the (1) discription or (2) comments field, related to users/userAddContent. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://github.com/doramart/DoraCMS/issues/136)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2002-1698, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2002-1698 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2002-1698 - **State**: PUBLISHED - **Published Date**: June 21, 2005 at 04:00 UTC - **Last Updated**: August 08, 2024 at 03:34 UTC - **Reserved Date**: June 21, 2005 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Buffer overflow in Microsoft MSN Messenger Service 1.0 through 4.6 allows remote attackers to cause a denial of service (crash) via a long FN (font) argument in the message header. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [4675](http://www.securityfocus.com/bid/4675) 2. [msn-font-header-bo(9014)](https://exchange.xforce.ibmcloud.com/vulnerabilities/9014) 3. [20020506 Misformated message header causes msn messenger to crash](http://online.securityfocus.com/archive/1/271130)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2020-21469, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2020-21469 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2020-21469 - **State**: PUBLISHED - **Published Date**: August 22, 2023 at 00:00 UTC - **Last Updated**: August 04, 2024 at 14:30 UTC - **Reserved Date**: August 13, 2020 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in PostgreSQL 12.2 allows attackers to cause a denial of service via repeatedly sending SIGHUP signals. NOTE: this is disputed by the vendor because untrusted users cannot send SIGHUP signals; they can only be sent by a PostgreSQL superuser, a user with pg_reload_conf access, or a user with sufficient privileges at the OS level (the postgres account or the root account). ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://www.postgresql.org/support/security/) 2. [](https://www.postgresql.org/message-id/CAA8ZSMqAHDCgo07hqKoM5XJaoQy6Vv76O7966agez4ffyQktkA%40mail.gmail.com) 3. [](https://www.postgresql.org/message-id/flat/CAA8ZSMqAHDCgo07hqKoM5XJaoQy6Vv76O7966agez4ffyQktkA%40mail.gmail.com)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2007-3203, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2007-3203 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2007-3203 - **State**: PUBLISHED - **Published Date**: June 12, 2007 at 23:00 UTC - **Last Updated**: August 07, 2024 at 14:05 UTC - **Reserved Date**: June 12, 2007 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Stack-based buffer overflow in smtpdll.dll in the SMTP service in 602Pro LAN SUITE 2003 2003.0.03.0828 allows remote attackers to execute arbitrary code via an e-mail message with a long address. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [25429](http://secunia.com/advisories/25429) 2. [lansuite-smtpdll-bo(34834)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34834) 3. [24437](http://www.securityfocus.com/bid/24437) 4. [VU#445313](http://www.kb.cert.org/vuls/id/445313) 5. [37232](http://osvdb.org/37232) 6. [602prolansuite-smtp-bo(34974)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34974)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2006-6363, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2006-6363 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2006-6363 - **State**: PUBLISHED - **Published Date**: December 07, 2006 at 11:00 UTC - **Last Updated**: August 07, 2024 at 20:26 UTC - **Reserved Date**: December 06, 2006 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description Cross-site scripting (XSS) vulnerability in admin.pl in BlueSocket Secure Controller (BSC) before 5.2, or without 5.1.1-BluePatch, allows remote attackers to inject arbitrary web script or HTML via the ad_name parameter. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [ADV-2006-4844](http://www.vupen.com/english/advisories/2006/4844) 2. [21419](http://www.securityfocus.com/bid/21419) 3. [bluesecurecontroller-admin-xss(30735)](https://exchange.xforce.ibmcloud.com/vulnerabilities/30735) 4. [20061202 [ISecAuditors Advisories] BlueSocket web administration is vulnerable to XSS](http://www.securityfocus.com/archive/1/453412/100/0/threaded) 5. [1991](http://securityreason.com/securityalert/1991) 6. [23238](http://secunia.com/advisories/23238)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-31398, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-31398 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-31398 - **State**: PUBLISHED - **Published Date**: June 13, 2022 at 12:54 UTC - **Last Updated**: August 03, 2024 at 07:19 UTC - **Reserved Date**: May 23, 2022 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description A cross-site scripting (XSS) vulnerability in /staff/tools/custom-fields of Helpdeskz v2.0.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the email name field. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://youtu.be/OungdOub18c)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2018-17930, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2018-17930 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2018-17930 - **State**: PUBLISHED - **Published Date**: November 28, 2018 at 23:00 UTC - **Last Updated**: September 17, 2024 at 04:00 UTC - **Reserved Date**: October 02, 2018 at 00:00 UTC - **Assigned By**: icscert ### Vulnerability Description A stack-based buffer overflow vulnerability has been identified in Teledyne DALSA Sherlock Version 7.2.7.4 and prior, which may allow remote code execution. ### Weakness Classification (CWE) - CWE-121: Stack-based Buffer Overflow ### Affected Products **ICS-CERT - Teledyne DALSA Sherlock** Affected versions: - Sherlock Version 7.2.7.4 and prior (Status: affected) ### References 1. [105967](http://www.securityfocus.com/bid/105967) 2. [](https://ics-cert.us-cert.gov/advisories/ICSA-18-324-01%2C) 3. [](https://www.teledynedalsa.com/en/products/imaging/vision-software/sherlock/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-34460, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-34460 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-34460 - **State**: PUBLISHED - **Published Date**: January 18, 2023 at 05:25 UTC - **Last Updated**: April 03, 2025 at 19:38 UTC - **Reserved Date**: June 23, 2022 at 18:55 UTC - **Assigned By**: dell ### Vulnerability Description Prior Dell BIOS versions contain an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM. ### CVSS Metrics - **CVSS Base Score**: 7.5/10.0 - **Severity**: HIGH - **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H` ### Weakness Classification (CWE) - CWE-20: Improper Input Validation ### Affected Products **Dell - BIOS** Affected versions: - 0 (Status: affected) ### References 1. [](https://www.dell.com/support/kbdoc/000204686)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2021-26307, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2021-26307 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2021-26307 - **State**: PUBLISHED - **Published Date**: January 29, 2021 at 02:27 UTC - **Last Updated**: August 03, 2024 at 20:19 UTC - **Reserved Date**: January 29, 2021 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description An issue was discovered in the raw-cpuid crate before 9.0.0 for Rust. It allows __cpuid_count() calls even if the processor does not support the CPUID instruction, which is unsound and causes a deterministic crash. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](https://rustsec.org/advisories/RUSTSEC-2021-0013.html)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2013-3096, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2013-3096 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2013-3096 - **State**: PUBLISHED - **Published Date**: February 07, 2020 at 18:36 UTC - **Last Updated**: August 06, 2024 at 16:00 UTC - **Reserved Date**: April 17, 2013 at 00:00 UTC - **Assigned By**: mitre ### Vulnerability Description D-Link DIR865L v1.03 suffers from an "Unauthenticated Hardware Linking" vulnerability. ### Affected Products **n/a - n/a** Affected versions: - n/a (Status: affected) ### References 1. [](http://securityevaluators.com/knowledge/case_studies/routers/Vulnerability_Catalog.pdf) 2. [](http://securityevaluators.com/knowledge/case_studies/routers/dlink_dir865l.php) 3. [](https://www.ise.io/research/studies-and-papers/dlink_dir865l/)
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
Provide a comprehensive technical analysis of CVE-2022-49150, including exploitation vectors, impact assessment, and remediation strategies.
## CVE-2022-49150 Vulnerability Details ### CVE Metadata - **CVE ID**: CVE-2022-49150 - **State**: PUBLISHED - **Published Date**: February 26, 2025 at 01:55 UTC - **Last Updated**: May 04, 2025 at 08:31 UTC - **Reserved Date**: February 26, 2025 at 01:49 UTC - **Assigned By**: Linux ### Vulnerability Description In the Linux kernel, the following vulnerability has been resolved: rtc: gamecube: Fix refcount leak in gamecube_rtc_read_offset_from_sram The of_find_compatible_node() function returns a node pointer with refcount incremented, We should use of_node_put() on it when done Add the missing of_node_put() to release the refcount. ### Affected Products **Linux - Linux** Affected versions: - 86559400b3ef9de93ba50523cffe767c35cd531a (Status: affected) - 86559400b3ef9de93ba50523cffe767c35cd531a (Status: affected) **Linux - Linux** Affected versions: - 5.17 (Status: affected) - 0 (Status: unaffected) - 5.17.2 (Status: unaffected) - 5.18 (Status: unaffected) ### References 1. [](https://git.kernel.org/stable/c/de66e4f28dfd11f954966c447b4430529ed040a2) 2. [](https://git.kernel.org/stable/c/4b2dc39ca024990abe36ad5d145c4fe0c06afd34)