System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-2257, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-2257 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-2257
- **State**: PUBLISHED
- **Published Date**: March 26, 2025 at 08:21 UTC
- **Last Updated**: March 26, 2025 at 14:22 UTC
- **Reserved Date**: March 12, 2025 at 17:02 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Total Upkeep – WordPress Backup Plugin plus Restore & Migrate by BoldGrid plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.16.10 via the compression_level setting. This is due to the plugin using the compression_level setting in proc_open() without any validation. This makes it possible for authenticated attackers, with administrator-level access and above, to execute code on the server.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**boldgrid - Total Upkeep – WordPress Backup Plugin plus Restore & Migrate by BoldGrid**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/1ec3cc3e-c11b-43b6-9dd0-caa5ccfb90c8?source=cve)
2. [](https://plugins.svn.wordpress.org/boldgrid-backup/tags/1.16.7/admin/compressor/class-boldgrid-backup-admin-compressor-system-zip.php)
3. [](https://github.com/BoldGrid/boldgrid-backup/pull/622/files)
4. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3257988%40boldgrid-backup&new=3257988%40boldgrid-backup&sfp_email=&sfph_mail=#file9)
### Credits
- Dzmitry Sviatlichny |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-32157, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-32157 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-32157
- **State**: PUBLISHED
- **Published Date**: April 04, 2025 at 15:58 UTC
- **Last Updated**: April 04, 2025 at 20:16 UTC
- **Reserved Date**: April 04, 2025 at 10:00 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Jakub Glos Sparkle Elementor Kit allows PHP Local File Inclusion. This issue affects Sparkle Elementor Kit: from n/a through 2.0.9.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-98: Security Weakness
### Affected Products
**Jakub Glos - Sparkle Elementor Kit**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/sparkle-elementor-kit/vulnerability/wordpress-sparkle-elementor-kit-plugin-2-0-9-local-file-inclusion-vulnerability?_s_id=cve)
### Credits
- João Pedro S Alcântara (Kinorth) (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-14437, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-14437 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-14437
- **State**: PUBLISHED
- **Published Date**: August 29, 2019 at 17:30 UTC
- **Last Updated**: August 05, 2024 at 00:19 UTC
- **Reserved Date**: July 29, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The xiph_SplitHeaders function in modules/demux/xiph.h in VideoLAN VLC media player 3.0.7.1 does not check array bounds properly. As a result, a heap-based buffer over-read can be triggered via a crafted .ogg file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://git.videolan.org/?p=vlc.git&a=search&h=refs%2Fheads%2Fmaster&st=commit&s=cve-2019)
2. [DSA-4504](https://www.debian.org/security/2019/dsa-4504)
3. [20190821 [SECURITY] [DSA 4504-1] vlc security update](https://seclists.org/bugtraq/2019/Aug/36)
4. [](https://www.videolan.org/security/sb-vlc308.html)
5. [GLSA-201909-02](https://security.gentoo.org/glsa/201909-02)
6. [USN-4131-1](https://usn.ubuntu.com/4131-1/)
7. [openSUSE-SU-2020:0545](http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00036.html)
8. [openSUSE-SU-2020:0562](http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00046.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-37967, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-37967 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-37967
- **State**: PUBLISHED
- **Published Date**: December 13, 2024 at 14:23 UTC
- **Last Updated**: December 13, 2024 at 18:32 UTC
- **Reserved Date**: July 11, 2023 at 11:34 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Missing Authorization vulnerability in Designinvento DirectoryPress allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects DirectoryPress: from n/a through 3.6.2.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**Designinvento - DirectoryPress**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/directorypress/vulnerability/wordpress-directorypress-plugin-3-6-2-unauthenticated-broken-access-control-vulnerability?_s_id=cve)
### Credits
- Abdi Pranata (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-3080, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-3080 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3080
- **State**: PUBLISHED
- **Published Date**: June 06, 2007 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 14:05 UTC
- **Reserved Date**: June 05, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in haberoku.asp in Hunkaray Okul Portaly 1.1 allows remote attackers to execute arbitrary SQL commands via the id parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [24288](http://www.securityfocus.com/bid/24288)
2. [2766](http://securityreason.com/securityalert/2766)
3. [38802](http://osvdb.org/38802)
4. [hunkaray-haberoku-sql-injection(34988)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34988) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-56317, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-56317 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-56317
- **State**: PUBLISHED
- **Published Date**: December 18, 2024 at 00:00 UTC
- **Last Updated**: January 02, 2025 at 19:14 UTC
- **Reserved Date**: December 18, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Matter (aka connectedhomeip or Project CHIP) through 1.4.0.0, the WriteAcl function deletes all existing ACL entries first, and then attempts to recreate them based on user input. If input validation fails during decoding, the process stops, and no entries are restored by access-control-server.cpp, i.e., a denial of service.
### Weakness Classification (CWE)
- CWE-281: Security Weakness
### Affected Products
**Matter - Matter**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://github.com/project-chip/connectedhomeip/issues/36535) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-16599, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-16599 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-16599
- **State**: PUBLISHED
- **Published Date**: December 09, 2020 at 21:06 UTC
- **Last Updated**: August 04, 2024 at 13:45 UTC
- **Reserved Date**: August 03, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A Null Pointer Dereference vulnerability exists in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35, in _bfd_elf_get_symbol_version_string, as demonstrated in nm-new, that can cause a denial of service via a crafted file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://sourceware.org/bugzilla/show_bug.cgi?id=25842)
2. [](https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=8d55d10ac0d112c586eaceb92e75bd9b80aadcc4)
3. [](https://security.netapp.com/advisory/ntap-20210122-0003/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-0183, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-0183 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0183
- **State**: PUBLISHED
- **Published Date**: March 28, 2018 at 22:00 UTC
- **Last Updated**: December 02, 2024 at 20:53 UTC
- **Reserved Date**: November 27, 2017 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the CLI parser of Cisco IOS XE Software could allow an authenticated, local attacker to gain access to the underlying Linux shell of an affected device and execute arbitrary commands with root privileges on the device. The vulnerability is due to the affected software improperly sanitizing command arguments to prevent access to internal data structures on a device. An attacker who has privileged EXEC mode (privilege level 15) access to an affected device could exploit this vulnerability on the device by executing CLI commands that contain crafted arguments. A successful exploit could allow the attacker to gain access to the underlying Linux shell of the affected device and execute arbitrary commands with root privileges on the device. Cisco Bug IDs: CSCuv91356.
### Weakness Classification (CWE)
- CWE-264: Security Weakness
### Affected Products
**n/a - Cisco IOS XE**
Affected versions:
- Cisco IOS XE (Status: affected)
### References
1. [](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-privesc3)
2. [103555](http://www.securityfocus.com/bid/103555) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-5592, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-5592 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-5592
- **State**: PUBLISHED
- **Published Date**: June 04, 2025 at 14:00 UTC
- **Last Updated**: June 04, 2025 at 14:17 UTC
- **Reserved Date**: June 04, 2025 at 08:15 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, has been found in FreeFloat FTP Server 1.0. Affected by this issue is some unknown functionality of the component PASSIVE Command Handler. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
- CWE-119: Security Weakness
### Affected Products
**FreeFloat - FTP Server**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-311078 | FreeFloat FTP Server PASSIVE Command buffer overflow](https://vuldb.com/?id.311078)
2. [VDB-311078 | CTI Indicators (IOB, IOC)](https://vuldb.com/?ctiid.311078)
3. [Submit #586990 | FreeFloat FTP Server 1.0 Buffer Overflow](https://vuldb.com/?submit.586990)
4. [](https://fitoxs.com/exploit/exploit-d28993dd71bcf3fbc63ff58db41e5f10a3ff7932e72d9e25c556cf18921a98e3.txt)
### Credits
- Fernando Mengali (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-21641, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-21641 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21641
- **State**: PUBLISHED
- **Published Date**: April 07, 2021 at 13:50 UTC
- **Last Updated**: October 15, 2024 at 17:14 UTC
- **Reserved Date**: January 04, 2021 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
A cross-site request forgery (CSRF) vulnerability in Jenkins promoted builds Plugin 3.9 and earlier allows attackers to to promote builds.
### Affected Products
**Jenkins project - Jenkins promoted builds Plugin**
Affected versions:
- unspecified (Status: affected)
- 3.5.1 (Status: unaffected)
### References
1. [](https://www.jenkins.io/security/advisory/2021-04-07/#SECURITY-2293)
2. [[oss-security] 20210407 Multiple vulnerabilities in Jenkins and Jenkins plugins](http://www.openwall.com/lists/oss-security/2021/04/07/2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-1228, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-1228 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1228
- **State**: PUBLISHED
- **Published Date**: September 06, 2013 at 10:00 UTC
- **Last Updated**: September 16, 2024 at 22:20 UTC
- **Reserved Date**: January 11, 2013 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Cisco Jabber on Windows does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and modify the client-server data stream via a crafted certificate, aka Bug ID CSCug30280.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20130905 Cisco Jabber for Windows Certificate Validation Vulnerability](http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1228) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-1625, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-1625 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1625
- **State**: PUBLISHED
- **Published Date**: April 05, 2006 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 17:19 UTC
- **Reserved Date**: April 05, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in inc/functions_post.php in MyBB (aka MyBulletinBoard) 1.10 allows remote attackers to inject arbitrary web script or HTML via a JavaScript event in a BBCode email tag, as demonstrated using the onmousemove event.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [17368](http://www.securityfocus.com/bid/17368)
2. [19516](http://secunia.com/advisories/19516)
3. [mybb-email-img-bbcode-xss(25615)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25615)
4. [24375](http://www.osvdb.org/24375)
5. [ADV-2006-1216](http://www.vupen.com/english/advisories/2006/1216)
6. [20060402 MyBB 1.10 New CrossSiteScripting](http://www.securityfocus.com/archive/1/429748/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-4348, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-4348 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-4348
- **State**: PUBLISHED
- **Published Date**: December 18, 2012 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 20:35 UTC
- **Reserved Date**: August 16, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The management console in Symantec Endpoint Protection (SEP) 11.0 before RU7-MP3 and 12.1 before RU2, and Symantec Endpoint Protection Small Business Edition 12.x before 12.1 RU2, does not properly validate input for PHP scripts, which allows remote authenticated users to execute arbitrary code via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20121210_00)
2. [56846](http://www.securityfocus.com/bid/56846)
3. [1027863](http://www.securitytracker.com/id?1027863) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-4745, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-4745 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4745
- **State**: PUBLISHED
- **Published Date**: September 06, 2007 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 15:08 UTC
- **Reserved Date**: September 06, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in the AkoBook 3.42 and earlier component (com_akobook) for Mambo allow remote attackers to inject arbitrary web script or HTML via Javascript events in the (1) gbmail and (2) gbpage parameters in the sign function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [37533](http://osvdb.org/37533)
2. [25576](http://www.securityfocus.com/bid/25576)
3. [](http://trew.icenetx.net/toolz/advisory-mambo-akobook-en.txt)
4. [26706](http://secunia.com/advisories/26706)
5. [3101](http://securityreason.com/securityalert/3101)
6. [ADV-2007-3080](http://www.vupen.com/english/advisories/2007/3080)
7. [akobook-gb-xss(36471)](https://exchange.xforce.ibmcloud.com/vulnerabilities/36471) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-36916, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-36916 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-36916
- **State**: PUBLISHED
- **Published Date**: May 30, 2024 at 15:29 UTC
- **Last Updated**: May 20, 2025 at 14:27 UTC
- **Reserved Date**: May 30, 2024 at 15:25 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
blk-iocost: avoid out of bounds shift
UBSAN catches undefined behavior in blk-iocost, where sometimes
iocg->delay is shifted right by a number that is too large,
resulting in undefined behavior on some architectures.
[ 186.556576] ------------[ cut here ]------------
UBSAN: shift-out-of-bounds in block/blk-iocost.c:1366:23
shift exponent 64 is too large for 64-bit type 'u64' (aka 'unsigned long long')
CPU: 16 PID: 0 Comm: swapper/16 Tainted: G S E N 6.9.0-0_fbk700_debug_rc2_kbuilder_0_gc85af715cac0 #1
Hardware name: Quanta Twin Lakes MP/Twin Lakes Passive MP, BIOS F09_3A23 12/08/2020
Call Trace:
<IRQ>
dump_stack_lvl+0x8f/0xe0
__ubsan_handle_shift_out_of_bounds+0x22c/0x280
iocg_kick_delay+0x30b/0x310
ioc_timer_fn+0x2fb/0x1f80
__run_timer_base+0x1b6/0x250
...
Avoid that undefined behavior by simply taking the
"delay = 0" branch if the shift is too large.
I am not sure what the symptoms of an undefined value
delay will be, but I suspect it could be more than a
little annoying to debug.
### Affected Products
**Linux - Linux**
Affected versions:
- 5160a5a53c0c4ae3708959d9465ea43ad5d90542 (Status: affected)
- 5160a5a53c0c4ae3708959d9465ea43ad5d90542 (Status: affected)
- 5160a5a53c0c4ae3708959d9465ea43ad5d90542 (Status: affected)
- 5160a5a53c0c4ae3708959d9465ea43ad5d90542 (Status: affected)
- 5160a5a53c0c4ae3708959d9465ea43ad5d90542 (Status: affected)
- 5160a5a53c0c4ae3708959d9465ea43ad5d90542 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.10 (Status: affected)
- 0 (Status: unaffected)
- 5.10.217 (Status: unaffected)
- 5.15.159 (Status: unaffected)
- 6.1.91 (Status: unaffected)
- 6.6.31 (Status: unaffected)
- 6.8.10 (Status: unaffected)
- 6.9 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/62accf6c1d7b433752cb3591bba8967b7a801ad5)
2. [](https://git.kernel.org/stable/c/844fc023e9f14a4fb1de5ae1eaefafd6d69c5fa1)
3. [](https://git.kernel.org/stable/c/f6add0a6f78dc6360b822ca4b6f9f2f14174c8ca)
4. [](https://git.kernel.org/stable/c/ce0e99cae00e3131872936713b7f55eefd53ab86)
5. [](https://git.kernel.org/stable/c/488dc6808cb8369685f18cee81e88e7052ac153b)
6. [](https://git.kernel.org/stable/c/beaa51b36012fad5a4d3c18b88a617aea7a9b96d) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-13261, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-13261 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-13261
- **State**: PUBLISHED
- **Published Date**: June 19, 2020 at 22:11 UTC
- **Last Updated**: August 04, 2024 at 12:11 UTC
- **Reserved Date**: May 21, 2020 at 00:00 UTC
- **Assigned By**: GitLab
### Vulnerability Description
Amazon EKS credentials disclosure in GitLab CE/EE 12.6 and later through 13.0.1 allows other administrators to view Amazon EKS credentials via HTML source code
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Affected Products
**GitLab - GitLab**
Affected versions:
- >=12.6, <12.9.8 (Status: affected)
- >=12.10, <12.10.7 (Status: affected)
- >=13.0, <13.0.1 (Status: affected)
### References
1. [](https://gitlab.com/gitlab-org/gitlab/-/issues/199242)
2. [](https://hackerone.com/reports/784130)
3. [](https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13261.json)
### Credits
- Thanks @xanbanx for reporting this vulnerability through our HackerOne bug bounty program |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-3240, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-3240 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-3240
- **State**: PUBLISHED
- **Published Date**: October 13, 2010 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 03:03 UTC
- **Reserved Date**: September 03, 2010 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Excel 2002 SP3 and 2007 SP2; Excel Viewer SP2; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2 do not properly validate record information, which allows remote attackers to execute arbitrary code via a crafted Excel document, aka "Real Time Data Array Record Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [oval:org.mitre.oval:def:7196](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7196)
2. [MS10-080](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-080)
3. [TA10-285A](http://www.us-cert.gov/cas/techalerts/TA10-285A.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-29271, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-29271 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-29271
- **State**: PUBLISHED
- **Published Date**: March 27, 2021 at 17:57 UTC
- **Last Updated**: August 03, 2024 at 22:02 UTC
- **Reserved Date**: March 27, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
remark42 before 1.6.1 allows XSS, as demonstrated by "Locator: Locator{URL:" followed by an XSS payload. This is related to backend/app/store/comment.go and backend/app/store/service/service.go.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/umputun/remark42/compare/v1.6.0...v1.6.1)
2. [](https://vuln.ryotak.me/advisories/19) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-43816, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-43816 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-43816
- **State**: PUBLISHED
- **Published Date**: August 17, 2024 at 09:21 UTC
- **Last Updated**: May 04, 2025 at 09:26 UTC
- **Reserved Date**: August 17, 2024 at 09:11 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
scsi: lpfc: Revise lpfc_prep_embed_io routine with proper endian macro usages
On big endian architectures, it is possible to run into a memory out of
bounds pointer dereference when FCP targets are zoned.
In lpfc_prep_embed_io, the memcpy(ptr, fcp_cmnd, sgl->sge_len) is
referencing a little endian formatted sgl->sge_len value. So, the memcpy
can cause big endian systems to crash.
Redefine the *sgl ptr as a struct sli4_sge_le to make it clear that we are
referring to a little endian formatted data structure. And, update the
routine with proper le32_to_cpu macro usages.
### Affected Products
**Linux - Linux**
Affected versions:
- af20bb73ac2591631d504f3f859f073bcdb7e11e (Status: affected)
- af20bb73ac2591631d504f3f859f073bcdb7e11e (Status: affected)
**Linux - Linux**
Affected versions:
- 6.10 (Status: affected)
- 0 (Status: unaffected)
- 6.10.3 (Status: unaffected)
- 6.11 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/9fd003f344d502f65252963169df3dd237054e49)
2. [](https://git.kernel.org/stable/c/8bc7c617642db6d8d20ee671fb6c4513017e7a7e) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-22266, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-22266 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-22266
- **State**: PUBLISHED
- **Published Date**: March 22, 2023 at 00:00 UTC
- **Last Updated**: March 05, 2025 at 19:22 UTC
- **Reserved Date**: December 19, 2022 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Experience Manager versions 6.5.15.0 (and earlier) are affected by a URL Redirection to Untrusted Site ('Open Redirect') vulnerability. A low-privilege authenticated attacker could leverage this vulnerability to redirect users to malicious websites. Exploitation of this issue requires user interaction.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-601: URL Redirection to Untrusted Site
### Affected Products
**Adobe - Experience Manager**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/experience-manager/apsb23-18.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-7894, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-7894 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-7894
- **State**: PUBLISHED
- **Published Date**: March 09, 2015 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 13:03 UTC
- **Reserved Date**: October 06, 2014 at 00:00 UTC
- **Assigned By**: hp
### Vulnerability Description
The OLE Point of Sale (OPOS) drivers before 1.13.003 on HP Point of Sale Windows PCs allow remote attackers to execute arbitrary code via vectors involving OPOSPOSPrinter.ocx for PUSB Thermal Receipt printers, SerialUSB Thermal Receipt printers, Hybrid POS printers with MICR, Value PUSB Receipt printers, and Value Serial/USB Receipt printers, aka ZDI-CAN-2506.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SSRT101690](https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04583185)
2. [1031840](http://www.securitytracker.com/id/1031840)
3. [HPSBHF03279](https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04583185) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-4585, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-4585 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4585
- **State**: PUBLISHED
- **Published Date**: December 22, 2010 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 03:51 UTC
- **Reserved Date**: December 21, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in the auto-update functionality in Opera before 11.00 allows remote attackers to cause a denial of service (application crash) by triggering an Opera Unite update.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [42653](http://secunia.com/advisories/42653)
2. [](http://www.opera.com/docs/changelogs/unix/1100/)
3. [](http://www.opera.com/docs/changelogs/windows/1100/)
4. [](http://www.opera.com/docs/changelogs/mac/1100/)
5. [SUSE-SR:2010:024](http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-23217, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-23217 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-23217
- **State**: PUBLISHED
- **Published Date**: January 23, 2024 at 00:25 UTC
- **Last Updated**: May 15, 2025 at 14:58 UTC
- **Reserved Date**: January 12, 2024 at 22:22 UTC
- **Assigned By**: apple
### Vulnerability Description
A privacy issue was addressed with improved handling of temporary files. This issue is fixed in macOS Sonoma 14.3, watchOS 10.3, iOS 17.3 and iPadOS 17.3. An app may be able to bypass certain Privacy preferences.
### Affected Products
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT214059)
2. [](https://support.apple.com/en-us/HT214060)
3. [](https://support.apple.com/en-us/HT214061)
4. [](http://seclists.org/fulldisclosure/2024/Jan/33)
5. [](http://seclists.org/fulldisclosure/2024/Jan/36)
6. [](http://seclists.org/fulldisclosure/2024/Jan/39)
7. [](https://support.apple.com/kb/HT214085)
8. [](http://seclists.org/fulldisclosure/2024/Mar/22) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-1670, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-1670 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-1670
- **State**: PUBLISHED
- **Published Date**: May 19, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 21:59 UTC
- **Reserved Date**: May 19, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unknown vulnerability in Extreme BlackDiamond 10808 and 8800 switches running ExtremeWare XOS 11.1 before 11.1.3.3, 11.0 before 11.0.2.4, and 10.x allows remote authenticated users to execute arbitrary commands.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.extremenetworks.com/services/documentation/FieldNotices_FN0215-Security_Alert_EXOS.asp)
2. [15438](http://secunia.com/advisories/15438)
3. [ADV-2005-0572](http://www.vupen.com/english/advisories/2005/0572)
4. [VU#937838](http://www.kb.cert.org/vuls/id/937838) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-42867, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-42867 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-42867
- **State**: PUBLISHED
- **Published Date**: December 20, 2024 at 03:37 UTC
- **Last Updated**: December 27, 2024 at 18:33 UTC
- **Reserved Date**: September 14, 2023 at 19:05 UTC
- **Assigned By**: apple
### Vulnerability Description
This issue was addressed with improved validation of the process entitlement and Team ID. This issue is fixed in GarageBand 10.4.9. An app may be able to gain root privileges.
### Affected Products
**Apple - GarageBand**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/120299) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-9426, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-9426 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9426
- **State**: PUBLISHED
- **Published Date**: February 26, 2018 at 04:00 UTC
- **Last Updated**: August 05, 2024 at 17:02 UTC
- **Reserved Date**: June 03, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ws.php in the Facetag extension 0.0.3 for Piwigo allows SQL injection via the imageId parameter in a facetag.changeTag or facetag.listTags action.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.youtube.com/watch?v=MVCe_zYtFsQ)
2. [42094](https://www.exploit-db.com/exploits/42094/)
3. [](http://touhidshaikh.com/blog/poc/facetag-extension-piwigo-sqli/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-40739, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-40739 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-40739
- **State**: PUBLISHED
- **Published Date**: July 09, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 04:33 UTC
- **Reserved Date**: July 09, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A cross-site scripting (XSS) vulnerability in netbox v4.0.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter at /dcim/power-feeds/add.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/minhquan202/Vuln-Netbox) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-35252, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-35252 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-35252
- **State**: PUBLISHED
- **Published Date**: December 16, 2022 at 00:00 UTC
- **Last Updated**: April 17, 2025 at 20:18 UTC
- **Reserved Date**: June 22, 2021 at 00:00 UTC
- **Assigned By**: SolarWinds
### Vulnerability Description
Common encryption key appears to be used across all deployed instances of Serv-U FTP Server. Because of this an encrypted value that is exposed to an attacker can be simply recovered to plaintext.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-798: Cross-site Scripting (XSS)
### Affected Products
**SolarWinds - Serv-U FTP Server**
Affected versions:
- 15.3.0 (Status: affected)
### References
1. [https://documentation.solarwinds.com/en/success_center/servu/content/release_notes/servu_15-3-2_release_notes.htm](https://documentation.solarwinds.com/en/success_center/servu/content/release_notes/servu_15-3-2_release_notes.htm)
2. [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35252](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35252)
3. [https://www.solarwinds.com/trust-center/security-advisories/CVE-2021-35252](https://www.solarwinds.com/trust-center/security-advisories/CVE-2021-35252)
### Credits
- SecureWorks Disclosure Team |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6786, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6786 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6786
- **State**: PUBLISHED
- **Published Date**: September 29, 2014 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 12:24 UTC
- **Reserved Date**: September 19, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The Math for Kids - Subtraction (aka it.tinytap.attsa.deepsub) application 1.2.10 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
2. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
3. [VU#424009](http://www.kb.cert.org/vuls/id/424009) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-27535, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-27535 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-27535
- **State**: PUBLISHED
- **Published Date**: August 05, 2022 at 16:47 UTC
- **Last Updated**: August 03, 2024 at 05:32 UTC
- **Reserved Date**: March 21, 2022 at 00:00 UTC
- **Assigned By**: Kaspersky
### Vulnerability Description
Kaspersky VPN Secure Connection for Windows version up to 21.5 was vulnerable to arbitrary file deletion via abuse of its 'Delete All Service Data And Reports' feature by the local authenticated attacker.
### Affected Products
**n/a - Kaspersky VPN Secure Connection for Windows**
Affected versions:
- prior to 21.6 (Status: affected)
### References
1. [](https://support.kaspersky.com/general/vulnerability.aspx?el=12430#050822)
2. [](https://www.synopsys.com/blogs/software-security/cyrc-advisory-kasperksy-vpn-microsoft-windows/)
3. [](https://forum.kaspersky.com/topic/kaspersky-statement-on-cve-2022-27535-26742/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-21281, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-21281 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-21281
- **State**: PUBLISHED
- **Published Date**: January 14, 2025 at 18:03 UTC
- **Last Updated**: April 02, 2025 at 13:23 UTC
- **Reserved Date**: December 10, 2024 at 23:54 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft COM for Windows Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows Server 2025 (Server Core installation)**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows 11 version 22H3**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows 11 Version 23H2**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)**
Affected versions:
- 10.0.25398.0 (Status: affected)
**Microsoft - Windows 11 Version 24H2**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows Server 2025**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Microsoft COM for Windows Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21281) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-16576, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-16576 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16576
- **State**: PUBLISHED
- **Published Date**: December 20, 2017 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 20:27 UTC
- **Reserved Date**: November 06, 2017 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within XFA's field element. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-5092.
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Foxit - Foxit Reader**
Affected versions:
- 8.3.1.21155 (Status: affected)
### References
1. [](https://zerodayinitiative.com/advisories/ZDI-17-887)
2. [](https://www.foxitsoftware.com/support/security-bulletins.php) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-24579, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-24579 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-24579
- **State**: PUBLISHED
- **Published Date**: January 24, 2025 at 17:24 UTC
- **Last Updated**: January 24, 2025 at 19:01 UTC
- **Reserved Date**: January 23, 2025 at 14:50 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Kyle Phillips Nested Pages allows Stored XSS. This issue affects Nested Pages: from n/a through 3.2.9.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Kyle Phillips - Nested Pages**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/wp-nested-pages/vulnerability/wordpress-nested-pages-plugin-3-2-9-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- UKO (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-43775, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-43775 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-43775
- **State**: PUBLISHED
- **Published Date**: September 26, 2023 at 13:50 UTC
- **Last Updated**: September 24, 2024 at 13:19 UTC
- **Reserved Date**: September 22, 2023 at 05:10 UTC
- **Assigned By**: Eaton
### Vulnerability Description
Denial-of-service vulnerability in the web server of the Eaton SMP Gateway allows
attacker to potentially force an unexpected restart of the automation platform, impacting the availability of the product. In rare situations, the issue could cause
the SMP device to restart in Safe Mode or Max Safe Mode. When in Max Safe Mode, the product is
not vulnerable anymore.
### CVSS Metrics
- **CVSS Base Score**: 4.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**Eaton - SMP SG-4260**
Affected versions:
- 8.0 (Status: affected)
- 8.1 (Status: affected)
- 8.2 (Status: affected)
**Eaton - SMP SG-4250**
Affected versions:
- 7.0 (Status: affected)
- 7.1 (Status: affected)
- 7.2 (Status: affected)
- 8.0 (Status: affected)
- 8.1 (Status: affected)
- 8.2 (Status: affected)
**Eaton - SMP 4/DP**
Affected versions:
- 6.3 (Status: affected)
- 7.0 (Status: affected)
- 7.1 (Status: affected)
- 7.2 (Status: affected)
- 8.0 (Status: affected)
- 8.1 (Status: affected)
- 8.2 (Status: affected)
**Eaton - SMP 16**
Affected versions:
- 6.3 (Status: affected)
- 7.0 (Status: affected)
- 7.1 (Status: affected)
- 7.2 (Status: affected)
- 8.0 (Status: affected)
### References
1. [](https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2022-1008.pdf)
### Credits
- Communications Security Establishment, Canada. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-0962, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-0962 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-0962
- **State**: PUBLISHED
- **Published Date**: April 03, 2005 at 05:00 UTC
- **Last Updated**: August 07, 2024 at 21:35 UTC
- **Reserved Date**: April 03, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in index.php for Lighthouse Squirrelcart allows remote attackers to execute arbitrary SQL commands via the (1) crn parameter in a show action or (2) rn parameter in a show_detail action.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://digitalparadox.org/advisories/sqc.txt)
2. [squirrelcart-index-sql-injection(19904)](https://exchange.xforce.ibmcloud.com/vulnerabilities/19904)
3. [12944](http://www.securityfocus.com/bid/12944)
4. [14770](http://secunia.com/advisories/14770) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-0001, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-0001 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-0001
- **State**: PUBLISHED
- **Published Date**: March 11, 2022 at 00:00 UTC
- **Last Updated**: May 05, 2025 at 16:44 UTC
- **Reserved Date**: October 15, 2021 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
### Affected Products
**n/a - Intel(R) Processors**
Affected versions:
- See references (Status: affected)
### References
1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html)
2. [[oss-security] 20220318 Xen Security Advisory 398 v2 - Multiple speculative security issues](http://www.openwall.com/lists/oss-security/2022/03/18/2)
3. [](https://www.oracle.com/security-alerts/cpujul2022.html)
4. [](https://security.netapp.com/advisory/ntap-20220818-0004/)
5. [VU#155143](https://www.kb.cert.org/vuls/id/155143) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-5161, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-5161 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-5161
- **State**: PUBLISHED
- **Published Date**: September 26, 2023 at 01:51 UTC
- **Last Updated**: February 05, 2025 at 19:18 UTC
- **Reserved Date**: September 25, 2023 at 13:32 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Modal Window plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 5.3.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Affected Products
**wpcalc - Modal Window – create popup modal window**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/48e2129f-6a2c-45e4-a0cf-7d8d5f563a7f?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/modal-window/tags/5.3.5/public/shortcode.php#L53)
3. [](https://plugins.trac.wordpress.org/browser/modal-window/tags/5.3.5/public/class-public.php#L73)
4. [](https://plugins.trac.wordpress.org/changeset/2971132/modal-window#file195)
5. [](https://plugins.trac.wordpress.org/changeset/2971132/modal-window#file196)
### Credits
- Lana Codes |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-26544, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-26544 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-26544
- **State**: PUBLISHED
- **Published Date**: March 26, 2025 at 14:24 UTC
- **Last Updated**: March 26, 2025 at 15:31 UTC
- **Reserved Date**: February 12, 2025 at 13:58 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound UTM tags tracking for Contact Form 7 allows Reflected XSS. This issue affects UTM tags tracking for Contact Form 7: from n/a through 2.1.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**NotFound - UTM tags tracking for Contact Form 7**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/cf7-utm-tracking/vulnerability/wordpressutm-tags-landing-page-plugin-1-4-csrf-to-stored-xss-vulnerability?_s_id=cve)
### Credits
- João Pedro S Alcântara (Kinorth) (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-0364, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-0364 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-0364
- **State**: PUBLISHED
- **Published Date**: February 04, 2000 at 05:00 UTC
- **Last Updated**: August 01, 2024 at 16:34 UTC
- **Reserved Date**: June 07, 1999 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Microsoft Access 97 stores a database password as plaintext in a foreign mdb, allowing access to data.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [19990204 Microsoft Access 97 Stores Database Password as Plaintext](http://marc.info/?l=bugtraq&m=91816470220259&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-32597, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-32597 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-32597
- **State**: PUBLISHED
- **Published Date**: August 06, 2021 at 10:48 UTC
- **Last Updated**: October 25, 2024 at 13:51 UTC
- **Reserved Date**: May 11, 2021 at 00:00 UTC
- **Assigned By**: fortinet
### Vulnerability Description
Multiple improper neutralization of input during web page generation (CWE-79) in FortiManager and FortiAnalyzer versions 7.0.0, 6.4.5 and below, 6.2.7 and below user interface, may allow a remote authenticated attacker to perform a Stored Cross Site Scripting attack (XSS) by injecting malicious payload in GET parameters.
### CVSS Metrics
- **CVSS Base Score**: 4.6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N/E:P/RL:X/RC:C`
### Affected Products
**Fortinet - Fortinet FortiAnalyzer, FortiManager**
Affected versions:
- FortiAnalyzer 7.0.0, 6.4.5, 6.4.4, 6.4.3, 6.4.2, 6.4.1, 6.4.0, 6.2.7, 6.2.6, 6.2.5, 6.2.4, 6.2.3, 6.2.2, 6.2.1, 6.2.0, ; FortiManager 7.0.0, 6.4.5, 6.4.4, 6.4.3, 6.4.2, 6.4.1, 6.4.0, 6.2.7, 6.2.6, 6.2.5, 6.2.4, 6.2.3, 6.2.2, 6.2.1, 6.2.0, (Status: affected)
### References
1. [](https://fortiguard.com/advisory/FG-IR-21-054) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-41748, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-41748 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-41748
- **State**: PUBLISHED
- **Published Date**: August 31, 2023 at 17:54 UTC
- **Last Updated**: October 01, 2024 at 16:57 UTC
- **Reserved Date**: August 31, 2023 at 14:10 UTC
- **Assigned By**: Acronis
### Vulnerability Description
Remote command execution due to improper input validation. The following products are affected: Acronis Cloud Manager (Windows) before build 6.2.23089.203.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Acronis - Acronis Cloud Manager**
Affected versions:
- unspecified (Status: affected)
### References
1. [SEC-5816](https://security-advisory.acronis.com/advisories/SEC-5816)
### Credits
- @putsi (https://hackerone.com/putsi) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-19754, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-19754 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-19754
- **State**: PUBLISHED
- **Published Date**: December 05, 2018 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 11:44 UTC
- **Reserved Date**: November 29, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tarantella Enterprise before 3.11 allows bypassing Access Control.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20181130 CVE-2018-19754 - Security Bypass Access Control Vulnerability in Tarantella Enterprise before 3.11](http://seclists.org/fulldisclosure/2018/Nov/67)
2. [](http://packetstormsecurity.com/files/150542/Tarantella-Enterprise-Security-Bypass.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-0699, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-0699 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-0699
- **State**: PUBLISHED
- **Published Date**: February 07, 2023 at 00:00 UTC
- **Last Updated**: May 05, 2025 at 16:08 UTC
- **Reserved Date**: February 06, 2023 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use after free in GPU in Google Chrome prior to 110.0.5481.77 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page and browser shutdown. (Chromium security severity: Medium)
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2023/02/stable-channel-update-for-desktop.html)
2. [](https://crbug.com/1371859)
3. [GLSA-202309-17](https://security.gentoo.org/glsa/202309-17) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-25508, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-25508 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-25508
- **State**: PUBLISHED
- **Published Date**: March 10, 2022 at 23:35 UTC
- **Last Updated**: August 03, 2024 at 04:42 UTC
- **Reserved Date**: February 21, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An access control issue in the component /ManageRoute/postRoute of FreeTAKServer v1.9.8 allows unauthenticated attackers to cause a Denial of Service (DoS) via an unusually large amount of created routes, or create unsafe or false routes for legitimate users.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/FreeTAKTeam/FreeTakServer/issues/291) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-3584, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-3584 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3584
- **State**: PUBLISHED
- **Published Date**: October 30, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 10:50 UTC
- **Reserved Date**: May 14, 2014 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The SamlHeaderInHandler in Apache CXF before 2.6.11, 2.7.x before 2.7.8, and 3.0.x before 3.0.1 allows remote attackers to cause a denial of service (infinite loop) via a crafted SAML token in the authorization header of a request to a JAX-RS service.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20141024 New security advisories released for Apache CXF](http://seclists.org/oss-sec/2014/q4/437)
2. [61909](http://secunia.com/advisories/61909)
3. [70738](http://www.securityfocus.com/bid/70738)
4. [apache-cxf-cve20143584-dos(97753)](https://exchange.xforce.ibmcloud.com/vulnerabilities/97753)
5. [](http://cxf.apache.org/security-advisories.data/CVE-2014-3584.txt.asc)
6. [[cxf-commits] 20200116 svn commit: r1055336 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-12423.txt.asc security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html](https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E)
7. [[cxf-commits] 20200319 svn commit: r1058035 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html](https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E)
8. [[cxf-commits] 20200401 svn commit: r1058573 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2020-1954.txt.asc security-advisories.html](https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E)
9. [[cxf-commits] 20201112 svn commit: r1067927 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2020-13954.txt.asc security-advisories.html](https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E)
10. [[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html](https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E)
11. [[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html](https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-24083, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-24083 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-24083
- **State**: PUBLISHED
- **Published Date**: March 11, 2025 at 16:58 UTC
- **Last Updated**: May 19, 2025 at 21:37 UTC
- **Reserved Date**: January 16, 2025 at 23:11 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Untrusted pointer dereference in Microsoft Office allows an unauthorized attacker to execute code locally.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-822: Security Weakness
### Affected Products
**Microsoft - Microsoft Office 2019**
Affected versions:
- 19.0.0 (Status: affected)
**Microsoft - Microsoft 365 Apps for Enterprise**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Office LTSC for Mac 2021**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Office LTSC 2021**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Office LTSC 2024**
Affected versions:
- 1.0.0 (Status: affected)
**Microsoft - Microsoft Office LTSC for Mac 2024**
Affected versions:
- 1.0.0 (Status: affected)
**Microsoft - Microsoft Office 2016**
Affected versions:
- 16.0.0 (Status: affected)
### References
1. [Microsoft Office Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24083) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-22737, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-22737 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-22737
- **State**: PUBLISHED
- **Published Date**: December 22, 2022 at 00:00 UTC
- **Last Updated**: April 16, 2025 at 15:08 UTC
- **Reserved Date**: January 07, 2022 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
Constructing audio sinks could have lead to a race condition when playing audio files and closing windows. This could have lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.
### Affected Products
**Mozilla - Firefox ESR**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Thunderbird**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.mozilla.org/security/advisories/mfsa2022-01/)
2. [](https://www.mozilla.org/security/advisories/mfsa2022-02/)
3. [](https://www.mozilla.org/security/advisories/mfsa2022-03/)
4. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1745874) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-0895, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-0895 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-0895
- **State**: PUBLISHED
- **Published Date**: April 13, 2010 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 01:06 UTC
- **Reserved Date**: March 03, 2010 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Solaris component in Oracle Sun Product Suite OpenSolaris snv_119 allows local users to affect integrity and availability via unknown vectors related to IP Filter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [TA10-103B](http://www.us-cert.gov/cas/techalerts/TA10-103B.html)
2. [39455](http://www.securityfocus.com/bid/39455)
3. [](http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html)
4. [osps-solaris-unspecified-var2(57757)](https://exchange.xforce.ibmcloud.com/vulnerabilities/57757) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-8706, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-8706 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-8706
- **State**: PUBLISHED
- **Published Date**: August 13, 2020 at 02:55 UTC
- **Last Updated**: August 04, 2024 at 10:03 UTC
- **Reserved Date**: February 06, 2020 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Buffer overflow in a daemon for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
### Affected Products
**n/a - Intel(R) Server Boards, Server Systems and Compute Modules Advisory**
Affected versions:
- Before version 1.59 (Status: affected)
### References
1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html)
2. [](https://security.netapp.com/advisory/ntap-20200814-0002/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-13774, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-13774 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-13774
- **State**: PUBLISHED
- **Published Date**: August 30, 2017 at 09:00 UTC
- **Last Updated**: August 05, 2024 at 19:05 UTC
- **Reserved Date**: August 30, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Hikvision iVMS-4200 devices before v2.6.2.7 allow local users to generate password-recovery codes via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://ipvm.com/reports/hik-vms-pass) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-4241, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-4241 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-4241
- **State**: PUBLISHED
- **Published Date**: July 17, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 11:12 UTC
- **Reserved Date**: June 17, 2014 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.0.2.0 and 10.3.6.0 allows remote attackers to affect integrity via vectors related to WLS - Web Services.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.vmware.com/security/advisories/VMSA-2014-0012.html)
2. [20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities](http://www.securityfocus.com/archive/1/534161/100/0/threaded)
3. [oracle-cpujul2014-cve20144241(94559)](https://exchange.xforce.ibmcloud.com/vulnerabilities/94559)
4. [](http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html)
5. [20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities](http://seclists.org/fulldisclosure/2014/Dec/23)
6. [68649](http://www.securityfocus.com/bid/68649) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-11749, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-11749 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-11749
- **State**: PUBLISHED
- **Published Date**: July 30, 2017 at 16:00 UTC
- **Last Updated**: September 16, 2024 at 23:25 UTC
- **Reserved Date**: July 30, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
InternetSoft FTP Commander 8.02 and prior has an untrusted search path, allowing DLL hijacking via a Trojan horse dwmapi.dll file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://blog.pentest.space/2017/07/023-ftp-commander-802-unsafe-dll.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-0363, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-0363 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-0363
- **State**: PUBLISHED
- **Published Date**: April 10, 2023 at 13:17 UTC
- **Last Updated**: February 11, 2025 at 15:18 UTC
- **Reserved Date**: January 18, 2023 at 06:53 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Scheduled Announcements Widget WordPress plugin before 1.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - Scheduled Announcements Widget**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/6d332a47-e96c-455b-9e8f-db6dbb59b518)
### Credits
- Lana Codes
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-23746, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-23746 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-23746
- **State**: PUBLISHED
- **Published Date**: January 22, 2025 at 14:32 UTC
- **Last Updated**: January 22, 2025 at 15:10 UTC
- **Reserved Date**: January 16, 2025 at 11:29 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound CMC MIGRATE allows Reflected XSS. This issue affects CMC MIGRATE: from n/a through 0.0.3.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**NotFound - CMC MIGRATE**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/cmc-migrate/vulnerability/wordpress-cmc-migrate-plugin-0-0-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- João Pedro S Alcântara (Kinorth) (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-1321, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-1321 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-1321
- **State**: PUBLISHED
- **Published Date**: April 29, 2015 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 04:40 UTC
- **Reserved Date**: January 22, 2015 at 00:00 UTC
- **Assigned By**: canonical
### Vulnerability Description
Use-after-free vulnerability in the file picker implementation in Oxide before 1.6.5 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted webpage.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-2570-1](http://www.ubuntu.com/usn/USN-2570-1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-28899, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-28899 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-28899
- **State**: PUBLISHED
- **Published Date**: April 29, 2021 at 14:08 UTC
- **Last Updated**: August 03, 2024 at 21:55 UTC
- **Reserved Date**: March 19, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Vulnerability in the AC3AudioFileServerMediaSubsession, ADTSAudioFileServerMediaSubsession, and AMRAudioFileServerMediaSubsessionLive OnDemandServerMediaSubsession subclasses in Networks LIVE555 Streaming Media before 2021.3.16.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://lists.live555.com/pipermail/live-devel/2021-March/021891.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-47506, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-47506 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-47506
- **State**: PUBLISHED
- **Published Date**: October 11, 2024 at 15:37 UTC
- **Last Updated**: October 11, 2024 at 17:15 UTC
- **Reserved Date**: September 25, 2024 at 15:26 UTC
- **Assigned By**: juniper
### Vulnerability Description
A Deadlock vulnerability in the packet forwarding engine (PFE) of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS).
When a large amount of traffic is processed by ATP Cloud inspection, a deadlock can occur which will result in a PFE crash and restart. Whether the crash occurs, depends on system internal timing that is outside the attackers control.
This issue affects Junos OS on SRX Series:
* All versions before 21.3R3-S1,
* 21.4 versions before 21.4R3,
* 22.1 versions before 22.1R2,
* 22.2 versions before 22.2R1-S2, 22.2R2.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-833: Security Weakness
### Affected Products
**Juniper Networks - Junos OS**
Affected versions:
- 0 (Status: affected)
- 21.4 (Status: affected)
- 22.1 (Status: affected)
- 22.2 (Status: affected)
### References
1. [](https://supportportal.juniper.net/JSA88137) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-11366, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-11366 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-11366
- **State**: PUBLISHED
- **Published Date**: November 28, 2024 at 08:47 UTC
- **Last Updated**: November 28, 2024 at 12:45 UTC
- **Reserved Date**: November 18, 2024 at 19:01 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The SEO Landing Page Generator plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.66.2. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**intellasoftsolutions - SEO Landing Page Generator**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/99dcb6c4-b9c6-4d3d-942f-b3877cc3efa7?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/seo-landing-page-generator/trunk/admin/class-issslpg-admin-location-settings-page.php#L185)
3. [](https://plugins.trac.wordpress.org/browser/seo-landing-page-generator/trunk/admin/class-issslpg-admin-location-settings-page.php#L330)
4. [](https://plugins.trac.wordpress.org/browser/seo-landing-page-generator/trunk/admin/class-issslpg-admin-location-settings-page.php#L433)
5. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3197642%40seo-landing-page-generator&new=3197642%40seo-landing-page-generator&sfp_email=&sfph_mail=)
### Credits
- Dale Mavers |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-36887, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-36887 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-36887
- **State**: PUBLISHED
- **Published Date**: December 20, 2021 at 20:08 UTC
- **Last Updated**: March 28, 2025 at 16:15 UTC
- **Reserved Date**: July 19, 2021 at 00:00 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability leading to Cross-Site Scripting (XSS) discovered in tarteaucitron.js – Cookies legislation & GDPR WordPress plugin (versions <= 1.5.4), vulnerable parameters "tarteaucitronEmail" and "tarteaucitronPass".
### CVSS Metrics
- **CVSS Base Score**: 6.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Tarteaucitron - tarteaucitron.js – Cookies legislation & GDPR (WordPress plugin)**
Affected versions:
- <= 1.5.4 (Status: affected)
### References
1. [](https://wordpress.org/plugins/tarteaucitronjs/#developers)
2. [](https://patchstack.com/database/vulnerability/tarteaucitronjs/wordpress-tarteaucitron-js-cookies-legislation-gdpr-plugin-1-5-4-cross-site-request-forgery-csrf-vulnerability-leading-to-cross-site-scripting-xss)
### Credits
- Vulnerability discovered by Julio Potier (SecuPress) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-3122, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-3122 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3122
- **State**: PUBLISHED
- **Published Date**: August 10, 2011 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 23:22 UTC
- **Reserved Date**: August 10, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in WordPress 3.1 before 3.1.3 and 3.2 before Beta 2 has unknown impact and attack vectors related to "Media security."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [47995](http://www.securityfocus.com/bid/47995)
2. [49138](http://secunia.com/advisories/49138)
3. [](http://wordpress.org/news/2011/05/wordpress-3-1-3/)
4. [DSA-2470](http://www.debian.org/security/2012/dsa-2470)
5. [wordpress-media-unspecified(69175)](https://exchange.xforce.ibmcloud.com/vulnerabilities/69175) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-24028, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-24028 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-24028
- **State**: PUBLISHED
- **Published Date**: February 29, 2024 at 00:00 UTC
- **Last Updated**: November 07, 2024 at 21:30 UTC
- **Reserved Date**: January 25, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Server Side Request Forgery (SSRF) vulnerability in Likeshop before 2.5.7 allows attackers to view sensitive information via the avatar parameter in function UserLogic::updateWechatInfo.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://thanhlo.substack.com/p/khai-thac-lo-hong-cve-2024-24028) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-27064, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-27064 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-27064
- **State**: PUBLISHED
- **Published Date**: March 13, 2023 at 00:00 UTC
- **Last Updated**: February 27, 2025 at 20:42 UTC
- **Reserved Date**: February 27, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tenda V15V1.0 V15.11.0.14(1521_3190_1058) was discovered to contain a buffer overflow vulnerability via the index parameter in the formDelDnsForward function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/didi-zhiyuan/vuln/blob/main/iot/Tenda/W15EV1/formDelDnsForward.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-21818, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-21818 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-21818
- **State**: PUBLISHED
- **Published Date**: February 14, 2022 at 23:45 UTC
- **Last Updated**: August 03, 2024 at 02:53 UTC
- **Reserved Date**: December 10, 2021 at 00:00 UTC
- **Assigned By**: nvidia
### Vulnerability Description
NVIDIA License System contains a vulnerability in the installation scripts for the DLS virtual appliance, where a user on a network after signing in to the portal can access other users’ credentials, allowing them to gain escalated privileges, resulting in limited impact to both confidentiality and integrity.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-312: Security Weakness
### Affected Products
**NVIDIA - NVIDIA License System**
Affected versions:
- All versions prior to 1.1 (Status: affected)
### References
1. [](https://nvidia.custhelp.com/app/answers/detail/a_id/5319) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-8538, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-8538 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-8538
- **State**: PUBLISHED
- **Published Date**: September 07, 2024 at 08:37 UTC
- **Last Updated**: September 09, 2024 at 13:56 UTC
- **Reserved Date**: September 06, 2024 at 18:05 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Big File Uploads – Increase Maximum File Upload Size plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 2.1.2. This is due the plugin not sanitizing a file path in an error message. This makes it possible for authenticated attackers, with author-level access and above, to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**uglyrobot - Big File Uploads – Increase Maximum File Upload Size**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/1bd308a4-7157-4bc6-a55b-c6a4a62510a9?source=cve)
2. [](https://github.com/uglyrobot/big-file-uploads/blob/master/tuxedo_big_file_uploads.php#L601)
3. [](https://plugins.trac.wordpress.org/changeset/3147755/tuxedo-big-file-uploads/trunk/tuxedo_big_file_uploads.php)
### Credits
- Pedro Antônio Gonçalves |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-8049, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-8049 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-8049
- **State**: PUBLISHED
- **Published Date**: April 03, 2018 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 06:46 UTC
- **Reserved Date**: March 11, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Stealth endpoint in Unisys Stealth SVG 2.8.x, 3.0.x before 3.0.1999, 3.1.x, 3.2.x before 3.2.030, and 3.3.x before 3.3.016, when running on Linux and AIX, allows remote attackers to cause a denial of service (crash) via crafted packets.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=48) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-25059, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-25059 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25059
- **State**: PUBLISHED
- **Published Date**: April 07, 2023 at 08:40 UTC
- **Last Updated**: January 10, 2025 at 19:03 UTC
- **Reserved Date**: February 02, 2023 at 09:58 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in avalex GmbH avalex – Automatically secure legal texts plugin <= 3.0.3 versions.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**avalex GmbH - avalex – Automatically secure legal texts**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/avalex/wordpress-avalex-plugin-3-0-3-cross-site-scripting-xss?_s_id=cve)
### Credits
- Rio Darmawan (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-8856, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-8856 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-8856
- **State**: PUBLISHED
- **Published Date**: October 31, 2016 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 02:35 UTC
- **Reserved Date**: October 19, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Foxit Reader for Mac 2.1.0.0804 and earlier and Foxit Reader for Linux 2.1.0.0805 and earlier suffered from a vulnerability where weak file permissions could be exploited by attackers to execute arbitrary code. After the installation, Foxit Reader's core files were world-writable by default, allowing an attacker to overwrite them with backdoor code, which when executed by privileged user would result in Privilege Escalation, Code Execution, or both.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [93608](http://www.securityfocus.com/bid/93608)
2. [](https://www.foxitsoftware.com/support/security-bulletins.php)
3. [1037101](http://www.securitytracker.com/id/1037101) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-9814, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-9814 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-9814
- **State**: PUBLISHED
- **Published Date**: June 09, 2020 at 16:10 UTC
- **Last Updated**: August 04, 2024 at 10:43 UTC
- **Reserved Date**: March 02, 2020 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A logic issue existed resulting in memory corruption. This was addressed with improved state management. This issue is fixed in iOS 13.5 and iPadOS 13.5, macOS Catalina 10.15.5, tvOS 13.4.5, watchOS 6.2.5. A malicious application may be able to execute arbitrary code with kernel privileges.
### Affected Products
**Apple - iOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/HT211168)
2. [](https://support.apple.com/HT211170)
3. [](https://support.apple.com/HT211171)
4. [](https://support.apple.com/HT211175) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-1787, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-1787 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1787
- **State**: PUBLISHED
- **Published Date**: July 30, 2010 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 01:35 UTC
- **Reserved Date**: May 06, 2010 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.1 on Mac OS X 10.4; and webkitgtk before 1.2.6; allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a floating element in an SVG document.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MDVSA-2011:039](http://www.mandriva.com/security/advisories?name=MDVSA-2011:039)
2. [ADV-2010-2722](http://www.vupen.com/english/advisories/2010/2722)
3. [43068](http://secunia.com/advisories/43068)
4. [APPLE-SA-2010-09-08-1](http://lists.apple.com/archives/security-announce/2010//Sep/msg00002.html)
5. [](http://support.apple.com/kb/HT4334)
6. [](http://support.apple.com/kb/HT4276)
7. [USN-1006-1](http://www.ubuntu.com/usn/USN-1006-1)
8. [41856](http://secunia.com/advisories/41856)
9. [ADV-2011-0212](http://www.vupen.com/english/advisories/2011/0212)
10. [APPLE-SA-2010-07-28-1](http://lists.apple.com/archives/security-announce/2010//Jul/msg00001.html)
11. [ADV-2011-0216](http://www.vupen.com/english/advisories/2011/0216)
12. [oval:org.mitre.oval:def:11877](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11877)
13. [43086](http://secunia.com/advisories/43086)
14. [SUSE-SR:2011:002](http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html)
15. [42314](http://secunia.com/advisories/42314)
16. [RHSA-2011:0177](http://www.redhat.com/support/errata/RHSA-2011-0177.html)
17. [ADV-2011-0552](http://www.vupen.com/english/advisories/2011/0552)
18. [42020](http://www.securityfocus.com/bid/42020)
19. [](http://support.apple.com/kb/HT4456)
20. [SUSE-SR:2010:018](http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html)
21. [APPLE-SA-2010-11-22-1](http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-23825, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-23825 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-23825
- **State**: PUBLISHED
- **Published Date**: July 14, 2022 at 19:27 UTC
- **Last Updated**: September 16, 2024 at 17:48 UTC
- **Reserved Date**: January 21, 2022 at 00:00 UTC
- **Assigned By**: AMD
### Vulnerability Description
Aliases in the branch predictor may cause some AMD processors to predict the wrong branch type potentially leading to information disclosure.
### Affected Products
**AMD - AMD Processors**
Affected versions:
- Processor Some AMD Processors (Status: affected)
### References
1. [FEDORA-2022-c69ef9c1dd](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M27MB3QFNIJV4EQQSXWARHP3OGX6CR6K/)
2. [](https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037)
3. [FEDORA-2022-8aab5b5cde](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D4RW5FCIYFNCQOEFJEUIRW3DGYW7CWBG/)
4. [DSA-5184](https://www.debian.org/security/2022/dsa-5184)
5. [FEDORA-2022-3e6ce58029](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KLSRW4LLTAT3CZMOYVNTC7YIYGX3KLED/)
6. [FEDORA-2022-a0d7a5eaf2](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM/)
7. [[oss-security] 20221108 Xen Security Advisory 422 v1 (CVE-2022-23824) - x86: Multiple speculative security issues](http://www.openwall.com/lists/oss-security/2022/11/08/1)
8. [[oss-security] 20221110 Xen Security Advisory 422 v2 (CVE-2022-23824) - x86: Multiple speculative security issues](http://www.openwall.com/lists/oss-security/2022/11/10/2)
9. [GLSA-202402-07](https://security.gentoo.org/glsa/202402-07) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-4472, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-4472 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-4472
- **State**: PUBLISHED
- **Published Date**: December 22, 2005 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 23:46 UTC
- **Reserved Date**: December 21, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in the Macromedia JRun 4 web server (JWS) allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long request that is not properly handled during conversion to wide characters.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2005-2949](http://www.vupen.com/english/advisories/2005/2949)
2. [16026](http://www.securityfocus.com/bid/16026)
3. [283](http://securityreason.com/securityalert/283)
4. [18077](http://secunia.com/advisories/18077)
5. [15905](http://www.securityfocus.com/bid/15905)
6. [1015370](http://securitytracker.com/id?1015370)
7. [](http://www.macromedia.com/devnet/security/security_zone/mpsb05-13.html)
8. [20051221 Macromedia JRun 4 Web Server URL Parsing Buffer Overflow Vulnerability](http://www.idefense.com/intelligence/vulnerabilities/display.php?id=360) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-26015, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-26015 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-26015
- **State**: PUBLISHED
- **Published Date**: July 09, 2024 at 15:33 UTC
- **Last Updated**: August 01, 2024 at 23:59 UTC
- **Reserved Date**: February 14, 2024 at 09:18 UTC
- **Assigned By**: fortinet
### Vulnerability Description
An incorrect parsing of numbers with different radices vulnerability [CWE-1389] in FortiProxy version 7.4.3 and below, version 7.2.10 and below, version 7.0.17 and below and FortiOS version 7.4.3 and below, version 7.2.8 and below, version 7.0.15 and below IP address validation feature may permit an unauthenticated attacker to bypass the IP blocklist via crafted requests.
### CVSS Metrics
- **CVSS Base Score**: 3.1/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N/E:F/RL:W/RC:R`
### Weakness Classification (CWE)
- CWE-1389: Security Weakness
### Affected Products
**Fortinet - FortiProxy**
Affected versions:
- 7.4.0 (Status: affected)
- 7.2.0 (Status: affected)
- 7.0.0 (Status: affected)
**Fortinet - FortiOS**
Affected versions:
- 7.4.0 (Status: affected)
- 7.2.0 (Status: affected)
- 7.0.0 (Status: affected)
### References
1. [https://fortiguard.fortinet.com/psirt/FG-IR-23-446](https://fortiguard.fortinet.com/psirt/FG-IR-23-446) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-1512, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-1512 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-1512
- **State**: PUBLISHED
- **Published Date**: February 19, 2005 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 00:53 UTC
- **Reserved Date**: February 18, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Response_default.html in 04WebServer 1.42 allows remote attackers to execute arbitrary web script or HTML via script code in the URL, which is not quoted in the resulting default error page.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [11652](http://www.securityfocus.com/bid/11652)
2. [04webserver-error-xss(18033)](https://exchange.xforce.ibmcloud.com/vulnerabilities/18033)
3. [20041110 04WebServer Three Vulnerabilities](http://marc.info/?l=bugtraq&m=110012542615484&w=2)
4. [](http://www.soft3304.net/04WebServer/Security.html)
5. [](http://www.security.org.sg/vuln/04webserver142.html)
6. [20041115 Re: 04WebServer Three Vulnerabilities](http://marc.info/?l=bugtraq&m=110054395311823&w=2)
7. [13159](http://secunia.com/advisories/13159/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-3177, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-3177 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-3177
- **State**: PUBLISHED
- **Published Date**: October 17, 2012 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 19:57 UTC
- **Reserved Date**: June 06, 2012 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.65 and earlier, and 5.5.27 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [51177](http://secunia.com/advisories/51177)
2. [RHSA-2012:1462](http://rhn.redhat.com/errata/RHSA-2012-1462.html)
3. [53372](http://secunia.com/advisories/53372)
4. [GLSA-201308-06](http://security.gentoo.org/glsa/glsa-201308-06.xml)
5. [DSA-2581](http://www.debian.org/security/2012/dsa-2581)
6. [mysqlserver-server-dos(79383)](https://exchange.xforce.ibmcloud.com/vulnerabilities/79383)
7. [](http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html)
8. [51309](http://secunia.com/advisories/51309)
9. [USN-1621-1](http://www.ubuntu.com/usn/USN-1621-1)
10. [MDVSA-2013:150](http://www.mandriva.com/security/advisories?name=MDVSA-2013:150) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-2444, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-2444 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2444
- **State**: PUBLISHED
- **Published Date**: August 14, 2018 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 04:21 UTC
- **Reserved Date**: December 15, 2017 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
SAP BusinessObjects Financial Consolidation, versions 10.0, 10.1, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability.
### Affected Products
**SAP - SAP BusinessObjects Financial Consolidation**
Affected versions:
- 10.0 (Status: affected)
- 10.1 (Status: affected)
### References
1. [105087](http://www.securityfocus.com/bid/105087)
2. [](https://launchpad.support.sap.com/#/notes/2621395)
3. [](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=499352742) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-50159, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-50159 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-50159
- **State**: PUBLISHED
- **Published Date**: January 11, 2024 at 00:00 UTC
- **Last Updated**: November 14, 2024 at 14:53 UTC
- **Reserved Date**: December 04, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In ScaleFusion (Windows Desktop App) agent 10.5.2, Kiosk mode application restrictions can be bypassed allowing arbitrary code to be executed. This is fixed in 10.5.7 by preventing the launching of the file explorer in Agent-based Multi-App and Single App Kiosk mode.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://medium.com/nestedif/vulnerability-disclosure-kiosk-mode-bypass-scalefusion-4752dfa2dc59)
2. [](https://medium.com/nestedif/vulnerability-disclosure-browser-mode-kiosk-bypass-scalefusion-832f5a18ebb6)
3. [](https://help.scalefusion.com/docs/security-advisory-for-windows-mdm-agent) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-6017, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-6017 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-6017
- **State**: PUBLISHED
- **Published Date**: January 12, 2014 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 17:29 UTC
- **Reserved Date**: October 04, 2013 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Atmail Webmail Server before 7.2 allows remote attackers to inject arbitrary web script or HTML via the body of an e-mail message, as demonstrated by the SRC attribute of an IFRAME element.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [101937](http://osvdb.org/101937)
2. [64779](http://www.securityfocus.com/bid/64779)
3. [VU#204950](http://www.kb.cert.org/vuls/id/204950)
4. [](http://atmail.com/changelog/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-7524, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-7524 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-7524
- **State**: PUBLISHED
- **Published Date**: March 28, 2019 at 13:45 UTC
- **Last Updated**: August 04, 2024 at 20:54 UTC
- **Reserved Date**: February 06, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Dovecot before 2.2.36.3 and 2.3.x before 2.3.5.1, a local attacker can cause a buffer overflow in the indexer-worker process, which can be used to elevate to root. This occurs because of missing checks in the fts and pop3-uidl components.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://dovecot.org/security.html)
2. [](https://dovecot.org/list/dovecot-news/2019-March/000403.html)
3. [[oss-security] 20190328 CVE-2019-7524: Buffer overflow when reading extension header from dovecot index files](http://www.openwall.com/lists/oss-security/2019/03/28/1)
4. [20190328 [SECURITY] [DSA 4418-1] dovecot security update](https://seclists.org/bugtraq/2019/Mar/59)
5. [DSA-4418](https://www.debian.org/security/2019/dsa-4418)
6. [[debian-lts-announce] 20190329 [SECURITY] [DLA 1736-1] dovecot security update](https://lists.debian.org/debian-lts-announce/2019/03/msg00038.html)
7. [USN-3928-1](https://usn.ubuntu.com/3928-1/)
8. [107672](http://www.securityfocus.com/bid/107672)
9. [openSUSE-SU-2019:1212](http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00060.html)
10. [openSUSE-SU-2019:1220](http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00067.html)
11. [GLSA-201904-19](https://security.gentoo.org/glsa/201904-19)
12. [FEDORA-2019-9e004decea](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4XLI55NGRDTGMVOPYFCPPFNPA5VKYSSY/)
13. [FEDORA-2019-1b61a528dd](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QHFZ5OWRIZGIWZJ5PTNVWWZNLLNH4XYS/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-23386, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-23386 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-23386
- **State**: PUBLISHED
- **Published Date**: May 20, 2021 at 16:15 UTC
- **Last Updated**: September 16, 2024 at 20:52 UTC
- **Reserved Date**: January 08, 2021 at 00:00 UTC
- **Assigned By**: snyk
### Vulnerability Description
This affects the package dns-packet before 5.2.2. It creates buffers with allocUnsafe and does not always fill them before forming network packets. This can expose internal application memory over unencrypted network when querying crafted invalid domain names.
### CVSS Metrics
- **CVSS Base Score**: 7.7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:L`
### Affected Products
**n/a - dns-packet**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://snyk.io/vuln/SNYK-JS-DNSPACKET-1293563)
2. [](https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1295719)
3. [](https://hackerone.com/bugs?subject=user&%3Breport_id=968858)
4. [](https://github.com/mafintosh/dns-packet/commit/25f15dd0fedc53688b25fd053ebbdffe3d5c1c56)
### Credits
- chalker |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-2135, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-2135 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-2135
- **State**: PUBLISHED
- **Published Date**: March 03, 2024 at 03:00 UTC
- **Last Updated**: August 01, 2024 at 19:03 UTC
- **Reserved Date**: March 02, 2024 at 07:45 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Bdtask Hospita AutoManager up to 20240223 and classified as problematic. This issue affects some unknown processing of the file /hospital_activities/birth/form of the component Hospital Activities Page. The manipulation of the argument Description with the input <img src=a onerror=alert(1)> leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-255497 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 2.4/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Bdtask - Hospita AutoManager**
Affected versions:
- 20240223 (Status: affected)
### References
1. [VDB-255497 | Bdtask Hospita AutoManager Hospital Activities Page form cross site scripting](https://vuldb.com/?id.255497)
2. [VDB-255497 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.255497)
3. [](https://drive.google.com/file/d/1zi8r84r0B2F45rWSYohZ6TO-PzyNJhnG/view?usp=drivesdk)
### Credits
- srivishnu (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-53115, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-53115 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-53115
- **State**: PUBLISHED
- **Published Date**: December 02, 2024 at 13:44 UTC
- **Last Updated**: May 04, 2025 at 13:00 UTC
- **Reserved Date**: November 19, 2024 at 17:17 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
drm/vmwgfx: avoid null_ptr_deref in vmw_framebuffer_surface_create_handle
The 'vmw_user_object_buffer' function may return NULL with incorrect
inputs. To avoid possible null pointer dereference, add a check whether
the 'bo' is NULL in the vmw_framebuffer_surface_create_handle.
### Affected Products
**Linux - Linux**
Affected versions:
- d6667f0ddf46c671d379cd5fe66ce0a54d2a743a (Status: affected)
- d6667f0ddf46c671d379cd5fe66ce0a54d2a743a (Status: affected)
- af6441e6f3d41e95bfc5bfc11960c259bb4f0f11 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.11 (Status: affected)
- 0 (Status: unaffected)
- 6.11.10 (Status: unaffected)
- 6.12 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/36f64da080555175b58d85f99f5f90435e274e56)
2. [](https://git.kernel.org/stable/c/93d1f41a82de382845af460bf03bcb17dcbf08c5) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-6282, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-6282 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-6282
- **State**: PUBLISHED
- **Published Date**: May 08, 2008 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 16:02 UTC
- **Reserved Date**: December 10, 2007 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The IPsec implementation in Linux kernel before 2.6.25 allows remote routers to cause a denial of service (crash) via a fragmented ESP packet in which the first fragment does not contain the entire ESP header and IV.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2008:0275](http://www.redhat.com/support/errata/RHSA-2008-0275.html)
2. [30962](http://secunia.com/advisories/30962)
3. [DSA-1630](http://www.debian.org/security/2008/dsa-1630)
4. [30294](http://secunia.com/advisories/30294)
5. [oval:org.mitre.oval:def:10549](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10549)
6. [RHSA-2008:0237](http://www.redhat.com/support/errata/RHSA-2008-0237.html)
7. [29081](http://www.securityfocus.com/bid/29081)
8. [31551](http://secunia.com/advisories/31551)
9. [SUSE-SA:2008:031](http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00000.html)
10. [RHSA-2008:0585](http://www.redhat.com/support/errata/RHSA-2008-0585.html)
11. [](https://bugzilla.redhat.com/show_bug.cgi?id=404291)
12. [31107](http://secunia.com/advisories/31107)
13. [30890](http://secunia.com/advisories/30890)
14. [31628](http://secunia.com/advisories/31628)
15. [USN-625-1](http://www.ubuntu.com/usn/usn-625-1)
16. [SUSE-SA:2008:030](http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html)
17. [linux-kernel-esp-dos(42276)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42276)
18. [30818](http://secunia.com/advisories/30818)
19. [[linux-netdev] 20080222 [Patch] Crash (BUG()) when handling fragmented ESP packets](http://marc.info/?l=linux-netdev&m=120372380411259&w=2)
20. [30112](http://secunia.com/advisories/30112)
21. [SUSE-SA:2008:032](http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00002.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-49629, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-49629 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-49629
- **State**: PUBLISHED
- **Published Date**: February 26, 2025 at 02:23 UTC
- **Last Updated**: May 04, 2025 at 08:42 UTC
- **Reserved Date**: February 26, 2025 at 02:21 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
nexthop: Fix data-races around nexthop_compat_mode.
While reading nexthop_compat_mode, it can be changed concurrently.
Thus, we need to add READ_ONCE() to its readers.
### Affected Products
**Linux - Linux**
Affected versions:
- 4f80116d3df3b23ee4b83ea8557629e1799bc230 (Status: affected)
- 4f80116d3df3b23ee4b83ea8557629e1799bc230 (Status: affected)
- 4f80116d3df3b23ee4b83ea8557629e1799bc230 (Status: affected)
- 4f80116d3df3b23ee4b83ea8557629e1799bc230 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.8 (Status: affected)
- 0 (Status: unaffected)
- 5.10.132 (Status: unaffected)
- 5.15.56 (Status: unaffected)
- 5.18.13 (Status: unaffected)
- 5.19 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/a51040d4b120f3520df64fb0b9c63b31d69bea9b)
2. [](https://git.kernel.org/stable/c/0d17723afea3ae8c9f245c9bbd2ba5945b77e812)
3. [](https://git.kernel.org/stable/c/ae3054f6fbccc90f14ecd6cf9b2c09a2401c64fd)
4. [](https://git.kernel.org/stable/c/bdf00bf24bef9be1ca641a6390fd5487873e0d2e) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-28391, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-28391 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-28391
- **State**: PUBLISHED
- **Published Date**: November 14, 2023 at 09:14 UTC
- **Last Updated**: October 03, 2024 at 14:04 UTC
- **Reserved Date**: March 20, 2023 at 13:45 UTC
- **Assigned By**: talos
### Vulnerability Description
A memory corruption vulnerability exists in the HTTP Server header parsing functionality of Weston Embedded uC-HTTP v3.01.01. Specially crafted network packets can lead to code execution. An attacker can send a malicious packet to trigger this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 9/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-119: Security Weakness
### Affected Products
**Silicon Labs - Gecko Platform**
Affected versions:
- 4.3.1.0 (Status: affected)
**Weston Embedded - Cesium NET**
Affected versions:
- 3.07.01 (Status: affected)
**Weston Embedded - uC-HTTP**
Affected versions:
- v3.01.01 (Status: affected)
### References
1. [https://talosintelligence.com/vulnerability_reports/TALOS-2023-1732](https://talosintelligence.com/vulnerability_reports/TALOS-2023-1732)
### Credits
- Discovered by Kelly Leuschner of Cisco Talos. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-34319, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-34319 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-34319
- **State**: PUBLISHED
- **Published Date**: November 14, 2022 at 17:23 UTC
- **Last Updated**: April 29, 2025 at 19:36 UTC
- **Reserved Date**: June 22, 2022 at 15:44 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM CICS TX 11.7 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 229463.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-327: Security Weakness
### Affected Products
**IBM - CICS TX**
Affected versions:
- 11.7 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6833192)
2. [](https://www.ibm.com/support/pages/node/6833190)
3. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/229463) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-24443, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-24443 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-24443
- **State**: PUBLISHED
- **Published Date**: August 02, 2021 at 10:31 UTC
- **Last Updated**: August 03, 2024 at 19:28 UTC
- **Reserved Date**: January 14, 2021 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The About Me widget of the Youzify – BuddyPress Community, User Profile, Social Network & Membership WordPress plugin before 1.0.7 does not properly sanitise its Biography field, allowing any authenticated user to set Cross-Site Scripting payloads in it, which will be executed when viewing the affected user profile. This could allow a low privilege user to gain unauthorised access to the admin side of the blog by targeting an admin, inducing them to view their profile with a malicious payload adding a rogue account for example.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Unknown - Youzify – BuddyPress Community, User Profile, Social Network & Membership Plugin for WordPress**
Affected versions:
- 1.0.7 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/a4432acd-df49-4a4f-8184-b55cdd5d4d34)
### Credits
- Phu Tran from techlabcorp.com |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-5381, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-5381 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-5381
- **State**: PUBLISHED
- **Published Date**: February 19, 2018 at 13:00 UTC
- **Last Updated**: September 16, 2024 at 16:17 UTC
- **Reserved Date**: January 12, 2018 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The Quagga BGP daemon (bgpd) prior to version 1.2.3 has a bug in its parsing of "Capabilities" in BGP OPEN messages, in the bgp_packet.c:bgp_capability_msg_parse function. The parser can enter an infinite loop on invalid capabilities if a Multi-Protocol capability does not have a recognized AFI/SAFI, causing a denial of service.
### Weakness Classification (CWE)
- CWE-228: Path Traversal
### Affected Products
**Quagga - bgpd**
Affected versions:
- bpgd (Status: affected)
### References
1. [](https://gogs.quagga.net/Quagga/quagga/src/master/doc/security/Quagga-2018-1975.txt)
2. [USN-3573-1](https://usn.ubuntu.com/3573-1/)
3. [DSA-4115](https://www.debian.org/security/2018/dsa-4115)
4. [](http://savannah.nongnu.org/forum/forum.php?forum_id=9095)
5. [GLSA-201804-17](https://security.gentoo.org/glsa/201804-17)
6. [[debian-lts-announce] 20180216 [SECURITY] [DLA 1286-1] quagga security update](https://lists.debian.org/debian-lts-announce/2018/02/msg00021.html)
7. [VU#940439](http://www.kb.cert.org/vuls/id/940439)
8. [](https://cert-portal.siemens.com/productcert/pdf/ssa-451142.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-13608, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-13608 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-13608
- **State**: PUBLISHED
- **Published Date**: August 29, 2019 at 18:33 UTC
- **Last Updated**: February 04, 2025 at 20:09 UTC
- **Reserved Date**: July 15, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Citrix StoreFront Server before 1903, 7.15 LTSR before CU4 (3.12.4000), and 7.6 LTSR before CU8 (3.0.8000) allows XXE attacks.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.citrix.com/article/CTX251988) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-0790, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-0790 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-0790
- **State**: PUBLISHED
- **Published Date**: January 28, 2025 at 23:31 UTC
- **Last Updated**: January 29, 2025 at 14:18 UTC
- **Reserved Date**: January 28, 2025 at 14:34 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as problematic was found in ESAFENET CDG V5. This vulnerability affects unknown code of the file /doneDetail.jsp. The manipulation of the argument curpage leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
- CWE-94: Code Injection
### Affected Products
**ESAFENET - CDG**
Affected versions:
- V5 (Status: affected)
### References
1. [VDB-293914 | ESAFENET CDG doneDetail.jsp cross site scripting](https://vuldb.com/?id.293914)
2. [VDB-293914 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.293914)
3. [Submit #483343 | esafenet CDG V5 Cross-Site Scripting (XSS)](https://vuldb.com/?submit.483343)
4. [](https://github.com/Rain1er/report/blob/main/CDG/doneDetail_1.md)
### Credits
- raindrop (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-8803, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-8803 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-8803
- **State**: PUBLISHED
- **Published Date**: February 23, 2016 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 08:29 UTC
- **Reserved Date**: February 02, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The ecc_256_modp function in ecc-256.c in Nettle before 3.2 does not properly handle carry propagation and produces incorrect output in its implementation of the P-256 NIST elliptic curve, which allows attackers to have unspecified impact via unknown vectors, a different vulnerability than CVE-2015-8805.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [openSUSE-SU-2016:0486](http://lists.opensuse.org/opensuse-updates/2016-02/msg00100.html)
2. [](https://blog.fuzzing-project.org/38-Miscomputations-of-elliptic-curve-scalar-multiplications-in-Nettle.html)
3. [[nettle-bugs] 20151212 secp256 calculation bug (already fixed)](https://lists.lysator.liu.se/pipermail/nettle-bugs/2015/003028.html)
4. [FEDORA-2016-8ee88aee21](http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177473.html)
5. [openSUSE-SU-2016:0477](http://lists.opensuse.org/opensuse-updates/2016-02/msg00093.html)
6. [](https://git.lysator.liu.se/nettle/nettle/commit/c71d2c9d20eeebb985e3872e4550137209e3ce4d)
7. [USN-2897-1](http://www.ubuntu.com/usn/USN-2897-1)
8. [openSUSE-SU-2016:0475](http://lists.opensuse.org/opensuse-updates/2016-02/msg00091.html)
9. [[oss-security] 20160202 Miscomputations of elliptic curve scalar multiplications in Nettle](http://www.openwall.com/lists/oss-security/2016/02/02/2)
10. [RHSA-2016:2582](http://rhn.redhat.com/errata/RHSA-2016-2582.html)
11. [FEDORA-2016-89968f88d2](http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176807.html)
12. [FEDORA-2016-aa00f0631d](http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177229.html)
13. [[info-gnu] 20160128 ANNOUNCE: Nettle-3.2](https://lists.gnu.org/archive/html/info-gnu/2016-01/msg00006.html)
14. [[oss-security] 20160202 Re: Miscomputations of elliptic curve scalar multiplications in Nettle](http://www.openwall.com/lists/oss-security/2016/02/03/1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-43987, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-43987 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-43987
- **State**: PUBLISHED
- **Published Date**: December 23, 2021 at 19:48 UTC
- **Last Updated**: September 16, 2024 at 23:35 UTC
- **Reserved Date**: November 17, 2021 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
An additional, nondocumented administrative account exists in mySCADA myPRO Versions 8.20.0 and prior that is not exposed through the web interface, which cannot be deleted or changed through the regular web interface.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-912: Security Weakness
### Affected Products
**mySCADA - myPRO**
Affected versions:
- All (Status: affected)
### References
1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-21-355-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-36324, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-36324 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-36324
- **State**: PUBLISHED
- **Published Date**: August 10, 2022 at 11:18 UTC
- **Last Updated**: April 21, 2025 at 13:51 UTC
- **Reserved Date**: July 20, 2022 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
Affected devices do not properly handle the renegotiation of SSL/TLS parameters. This could allow an unauthenticated remote attacker to bypass the TCP brute force prevention and lead to a denial of service condition for the duration of the attack.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-770: Security Weakness
### Affected Products
**Siemens - RUGGEDCOM RM1224 LTE(4G) EU**
Affected versions:
- All versions < V7.1.2 (Status: affected)
**Siemens - RUGGEDCOM RM1224 LTE(4G) NAM**
Affected versions:
- All versions < V7.1.2 (Status: affected)
**Siemens - SCALANCE M804PB**
Affected versions:
- All versions < V7.1.2 (Status: affected)
**Siemens - SCALANCE M812-1 ADSL-Router (Annex A)**
Affected versions:
- All versions < V7.1.2 (Status: affected)
**Siemens - SCALANCE M812-1 ADSL-Router (Annex B)**
Affected versions:
- All versions < V7.1.2 (Status: affected)
**Siemens - SCALANCE M816-1 ADSL-Router (Annex A)**
Affected versions:
- All versions < V7.1.2 (Status: affected)
**Siemens - SCALANCE M816-1 ADSL-Router (Annex B)**
Affected versions:
- All versions < V7.1.2 (Status: affected)
**Siemens - SCALANCE M826-2 SHDSL-Router**
Affected versions:
- All versions < V7.1.2 (Status: affected)
**Siemens - SCALANCE M874-2**
Affected versions:
- All versions < V7.1.2 (Status: affected)
**Siemens - SCALANCE M874-3**
Affected versions:
- All versions < V7.1.2 (Status: affected)
**Siemens - SCALANCE M876-3 (EVDO)**
Affected versions:
- All versions < V7.1.2 (Status: affected)
**Siemens - SCALANCE M876-3 (ROK)**
Affected versions:
- All versions < V7.1.2 (Status: affected)
**Siemens - SCALANCE M876-4 (EU)**
Affected versions:
- All versions < V7.1.2 (Status: affected)
**Siemens - SCALANCE M876-4 (NAM)**
Affected versions:
- All versions < V7.1.2 (Status: affected)
**Siemens - SCALANCE MUM853-1 (EU)**
Affected versions:
- All versions < V7.1.2 (Status: affected)
**Siemens - SCALANCE MUM856-1 (EU)**
Affected versions:
- All versions < V7.1.2 (Status: affected)
**Siemens - SCALANCE MUM856-1 (RoW)**
Affected versions:
- All versions < V7.1.2 (Status: affected)
**Siemens - SCALANCE S615**
Affected versions:
- All versions < V7.1.2 (Status: affected)
**Siemens - SCALANCE SC622-2C**
Affected versions:
- All versions < V2.3.1 (Status: affected)
**Siemens - SCALANCE SC626-2C**
Affected versions:
- All versions < V2.3.1 (Status: affected)
**Siemens - SCALANCE SC632-2C**
Affected versions:
- All versions < V2.3.1 (Status: affected)
**Siemens - SCALANCE SC636-2C**
Affected versions:
- All versions < V2.3.1 (Status: affected)
**Siemens - SCALANCE SC642-2C**
Affected versions:
- All versions < V2.3.1 (Status: affected)
**Siemens - SCALANCE SC646-2C**
Affected versions:
- All versions < V2.3.1 (Status: affected)
**Siemens - SCALANCE W1748-1 M12**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W1748-1 M12**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W1788-1 M12**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W1788-2 EEC M12**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W1788-2 M12**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W1788-2IA M12**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W721-1 RJ45**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W721-1 RJ45**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W722-1 RJ45**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W722-1 RJ45**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W722-1 RJ45**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W734-1 RJ45**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W734-1 RJ45**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W734-1 RJ45**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W734-1 RJ45 (USA)**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W738-1 M12**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W738-1 M12**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W748-1 M12**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W748-1 M12**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W748-1 RJ45**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W748-1 RJ45**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W761-1 RJ45**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W761-1 RJ45**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W774-1 M12 EEC**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W774-1 M12 EEC**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W774-1 RJ45**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W774-1 RJ45**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W774-1 RJ45**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W774-1 RJ45**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W774-1 RJ45 (USA)**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W778-1 M12**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W778-1 M12**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W778-1 M12 EEC**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W778-1 M12 EEC (USA)**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W786-1 RJ45**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W786-1 RJ45**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W786-2 RJ45**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W786-2 RJ45**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W786-2 RJ45**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W786-2 SFP**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W786-2 SFP**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W786-2IA RJ45**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W786-2IA RJ45**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W788-1 M12**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W788-1 M12**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W788-1 RJ45**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W788-1 RJ45**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W788-2 M12**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W788-2 M12**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W788-2 M12 EEC**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W788-2 M12 EEC**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W788-2 M12 EEC**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W788-2 RJ45**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W788-2 RJ45**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE W788-2 RJ45**
Affected versions:
- All versions (Status: affected)
**Siemens - SCALANCE WAM763-1**
Affected versions:
- All versions < V2.0 (Status: affected)
**Siemens - SCALANCE WAM766-1 (EU)**
Affected versions:
- All versions < V2.0 (Status: affected)
**Siemens - SCALANCE WAM766-1 (US)**
Affected versions:
- All versions < V2.0 (Status: affected)
**Siemens - SCALANCE WAM766-1 EEC (EU)**
Affected versions:
- All versions < V2.0 (Status: affected)
**Siemens - SCALANCE WAM766-1 EEC (US)**
Affected versions:
- All versions < V2.0 (Status: affected)
**Siemens - SCALANCE WUM763-1**
Affected versions:
- All versions < V2.0 (Status: affected)
**Siemens - SCALANCE WUM763-1**
Affected versions:
- All versions < V2.0 (Status: affected)
**Siemens - SCALANCE WUM766-1 (EU)**
Affected versions:
- All versions < V2.0 (Status: affected)
**Siemens - SCALANCE WUM766-1 (US)**
Affected versions:
- All versions < V2.0 (Status: affected)
**Siemens - SCALANCE XB205-3 (SC, PN)**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XB205-3 (ST, E/IP)**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XB205-3 (ST, E/IP)**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XB205-3 (ST, PN)**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XB205-3LD (SC, E/IP)**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XB205-3LD (SC, PN)**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XB208 (E/IP)**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XB208 (PN)**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XB213-3 (SC, E/IP)**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XB213-3 (SC, PN)**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XB213-3 (ST, E/IP)**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XB213-3 (ST, PN)**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XB213-3LD (SC, E/IP)**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XB213-3LD (SC, PN)**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XB216 (E/IP)**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XB216 (PN)**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XC206-2 (SC)**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XC206-2 (ST/BFOC)**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XC206-2G PoE**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XC206-2G PoE (54 V DC)**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XC206-2G PoE EEC (54 V DC)**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XC206-2SFP**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XC206-2SFP EEC**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XC206-2SFP G**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XC206-2SFP G (EIP DEF.)**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XC206-2SFP G EEC**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XC208**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XC208EEC**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XC208G**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XC208G (EIP def.)**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XC208G EEC**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XC208G PoE**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XC208G PoE (54 V DC)**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XC216**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XC216-3G PoE**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XC216-3G PoE (54 V DC)**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XC216-4C**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XC216-4C G**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XC216-4C G (EIP Def.)**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XC216-4C G EEC**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XC216EEC**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XC224**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XC224-4C G**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XC224-4C G (EIP Def.)**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XC224-4C G EEC**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XF204**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XF204 DNA**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XF204-2BA**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XF204-2BA DNA**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XM408-4C**
Affected versions:
- All versions < V6.6 (Status: affected)
**Siemens - SCALANCE XM408-4C (L3 int.)**
Affected versions:
- All versions < V6.6 (Status: affected)
**Siemens - SCALANCE XM408-8C**
Affected versions:
- All versions < V6.6 (Status: affected)
**Siemens - SCALANCE XM408-8C (L3 int.)**
Affected versions:
- All versions < V6.6 (Status: affected)
**Siemens - SCALANCE XM416-4C**
Affected versions:
- All versions < V6.6 (Status: affected)
**Siemens - SCALANCE XM416-4C (L3 int.)**
Affected versions:
- All versions < V6.6 (Status: affected)
**Siemens - SCALANCE XP208**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XP208 (Ethernet/IP)**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XP208EEC**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XP208PoE EEC**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XP216**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XP216 (Ethernet/IP)**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XP216EEC**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XP216POE EEC**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XR324WG (24 x FE, AC 230V)**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XR324WG (24 X FE, DC 24V)**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XR326-2C PoE WG**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XR326-2C PoE WG (without UL)**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XR328-4C WG (24XFE, 4XGE, 24V)**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V)**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XR328-4C WG (24xFE,4xGE,AC230V)**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XR328-4C WG (24xFE,4xGE,AC230V)**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XR328-4C WG (28xGE, AC 230V)**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XR328-4C WG (28xGE, DC 24V)**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SCALANCE XR524-8C, 1x230V**
Affected versions:
- All versions < V6.6 (Status: affected)
**Siemens - SCALANCE XR524-8C, 1x230V (L3 int.)**
Affected versions:
- All versions < V6.6 (Status: affected)
**Siemens - SCALANCE XR524-8C, 24V**
Affected versions:
- All versions < V6.6 (Status: affected)
**Siemens - SCALANCE XR524-8C, 24V (L3 int.)**
Affected versions:
- All versions < V6.6 (Status: affected)
**Siemens - SCALANCE XR524-8C, 2x230V**
Affected versions:
- All versions < V6.6 (Status: affected)
**Siemens - SCALANCE XR524-8C, 2x230V (L3 int.)**
Affected versions:
- All versions < V6.6 (Status: affected)
**Siemens - SCALANCE XR526-8C, 1x230V**
Affected versions:
- All versions < V6.6 (Status: affected)
**Siemens - SCALANCE XR526-8C, 1x230V (L3 int.)**
Affected versions:
- All versions < V6.6 (Status: affected)
**Siemens - SCALANCE XR526-8C, 24V**
Affected versions:
- All versions < V6.6 (Status: affected)
**Siemens - SCALANCE XR526-8C, 24V (L3 int.)**
Affected versions:
- All versions < V6.6 (Status: affected)
**Siemens - SCALANCE XR526-8C, 2x230V**
Affected versions:
- All versions < V6.6 (Status: affected)
**Siemens - SCALANCE XR526-8C, 2x230V (L3 int.)**
Affected versions:
- All versions < V6.6 (Status: affected)
**Siemens - SCALANCE XR528-6M**
Affected versions:
- All versions < V6.6 (Status: affected)
**Siemens - SCALANCE XR528-6M (2HR2, L3 int.)**
Affected versions:
- All versions < V6.6 (Status: affected)
**Siemens - SCALANCE XR528-6M (2HR2)**
Affected versions:
- All versions < V6.6 (Status: affected)
**Siemens - SCALANCE XR528-6M (L3 int.)**
Affected versions:
- All versions < V6.6 (Status: affected)
**Siemens - SCALANCE XR552-12M**
Affected versions:
- All versions < V6.6 (Status: affected)
**Siemens - SCALANCE XR552-12M (2HR2, L3 int.)**
Affected versions:
- All versions < V6.6 (Status: affected)
**Siemens - SCALANCE XR552-12M (2HR2)**
Affected versions:
- All versions < V6.6 (Status: affected)
**Siemens - SCALANCE XR552-12M (2HR2)**
Affected versions:
- All versions < V6.6 (Status: affected)
**Siemens - SIPLUS NET SCALANCE XC206-2**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SIPLUS NET SCALANCE XC206-2SFP**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SIPLUS NET SCALANCE XC208**
Affected versions:
- All versions < V4.4 (Status: affected)
**Siemens - SIPLUS NET SCALANCE XC216-4C**
Affected versions:
- All versions < V4.4 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-710008.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-21228, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-21228 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-21228
- **State**: PUBLISHED
- **Published Date**: April 24, 2020 at 14:34 UTC
- **Last Updated**: August 05, 2024 at 12:26 UTC
- **Reserved Date**: April 20, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D7800 before 1.0.1.34, EX6100v2 before 1.0.1.50, EX6150v2 before 1.0.1.50, EX6200v2 before 1.0.1.44, EX6400 before 1.0.1.60, EX7300 before 1.0.1.60, R6100 before 1.0.1.16, R7500 before 1.0.0.110, R7800 before 1.0.2.32, R9000 before 1.0.2.30, WN3000RPv3 before 1.0.2.50, WNDR4300v2 before 1.0.0.50, and WNDR4500v3 before 1.0.0.50.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.netgear.com/000055106/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-Gateways-and-Extenders-PSV-2017-0607) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-5068, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-5068 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-5068
- **State**: PUBLISHED
- **Published Date**: June 02, 2025 at 23:36 UTC
- **Last Updated**: June 04, 2025 at 03:55 UTC
- **Reserved Date**: May 21, 2025 at 17:31 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Use after free in Blink in Google Chrome prior to 137.0.7151.68 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
### Affected Products
**Google - Chrome**
Affected versions:
- 137.0.7151.68 (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop.html)
2. [](https://issues.chromium.org/issues/409059706) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1547, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1547 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1547
- **State**: PUBLISHED
- **Published Date**: March 20, 2007 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 12:59 UTC
- **Reserved Date**: March 20, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The ReadRequestFromClient function in server/os/io.c in Network Audio System (NAS) before 1.8a SVN 237 allows remote attackers to cause a denial of service (crash) via multiple simultaneous connections, which triggers a NULL pointer dereference.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MDKSA-2007:065](http://www.mandriva.com/security/advisories?name=MDKSA-2007:065)
2. [1017822](http://www.securitytracker.com/id?1017822)
3. [24980](http://secunia.com/advisories/24980)
4. [24527](http://secunia.com/advisories/24527)
5. [23017](http://www.securityfocus.com/bid/23017)
6. [24601](http://secunia.com/advisories/24601)
7. [USN-446-1](http://www.ubuntu.com/usn/usn-446-1)
8. [24628](http://secunia.com/advisories/24628)
9. [GLSA-200704-20](http://security.gentoo.org/glsa/glsa-200704-20.xml)
10. [ADV-2007-0997](http://www.vupen.com/english/advisories/2007/0997)
11. [nas-readrequestfromclient-dos(33059)](https://exchange.xforce.ibmcloud.com/vulnerabilities/33059)
12. [20070403 FLEA-2007-0007-1: nas](http://www.securityfocus.com/archive/1/464606/30/7230/threaded)
13. [24638](http://secunia.com/advisories/24638)
14. [](http://aluigi.altervista.org/adv/nasbugs-adv.txt)
15. [DSA-1273](http://www.debian.org/security/2007/dsa-1273)
16. [](http://www.radscan.com/nas/HISTORY) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-52164, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-52164 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-52164
- **State**: PUBLISHED
- **Published Date**: February 03, 2025 at 00:00 UTC
- **Last Updated**: February 05, 2025 at 16:40 UTC
- **Reserved Date**: December 29, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
access_device.cgi on Digiever DS-2105 Pro 3.1.0.71-11 devices allows arbitrary file read. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.txone.com/blog/digiever-fixes-sorely-needed/)
2. [](https://www.akamai.com/blog/security-research/digiever-fix-that-iot-thing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-5519, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-5519 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5519
- **State**: PUBLISHED
- **Published Date**: April 01, 2019 at 20:39 UTC
- **Last Updated**: August 04, 2024 at 20:01 UTC
- **Reserved Date**: January 07, 2019 at 00:00 UTC
- **Assigned By**: vmware
### Vulnerability Description
VMware ESXi (6.7 before ESXi670-201903001, 6.5 before ESXi650-201903001, 6.0 before ESXi600-201903001), Workstation (15.x before 15.0.4, 14.x before 14.1.7), Fusion (11.x before 11.0.3, 10.x before 10.1.6) contain a Time-of-check Time-of-use (TOCTOU) vulnerability in the virtual USB 1.1 UHCI (Universal Host Controller Interface). Exploitation of this issue requires an attacker to have access to a virtual machine with a virtual USB controller present. This issue may allow a guest to execute code on the host.
### Affected Products
**VMware - VMware ESXi, Workstation, Fusion**
Affected versions:
- ESXi 6.7 before ESXi670-201903001 (Status: affected)
- ESXi 6.5 before ESXi650-201903001 (Status: affected)
- ESXi 6.0 before ESXi600-201903001 (Status: affected)
- Workstation 15.x before 15.0.4 (Status: affected)
- Workstation 14.x before 14.1.7 (Status: affected)
- Fusion 11.x before 11.0.3 (Status: affected)
- Fusion 10.x before 10.1.6 (Status: affected)
### References
1. [107535](http://www.securityfocus.com/bid/107535)
2. [](http://packetstormsecurity.com/files/152290/VMware-Security-Advisory-2019-0005.html)
3. [](https://www.vmware.com/security/advisories/VMSA-2019-0005.html)
4. [](https://www.zerodayinitiative.com/advisories/ZDI-19-420/)
5. [108443](http://www.securityfocus.com/bid/108443) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-0108, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-0108 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0108
- **State**: PUBLISHED
- **Published Date**: August 08, 2024 at 16:18 UTC
- **Last Updated**: August 09, 2024 at 15:48 UTC
- **Reserved Date**: December 02, 2023 at 00:42 UTC
- **Assigned By**: nvidia
### Vulnerability Description
NVIDIA Jetson Linux contains a vulnerability in NvGPU where error handling paths in GPU MMU mapping code fail to clean up a failed mapping attempt. A successful exploit of this vulnerability may lead to denial of service, code execution, and escalation of privileges.
### CVSS Metrics
- **CVSS Base Score**: 8.7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L`
### Weakness Classification (CWE)
- CWE-755: Security Weakness
### Affected Products
**NVIDIA - NVIDIA Jetson AGX Xavier series, Jetson Xavier NX, Jetson TX2 series, Jetson TX2 NX, Jetson TX1, Jetson Nano series**
Affected versions:
- All versions prior to and including 32.7.4 (Status: affected)
### References
1. [](https://nvidia.custhelp.com/app/answers/detail/a_id/5555) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-4427, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-4427 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-4427
- **State**: PUBLISHED
- **Published Date**: August 29, 2006 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 19:06 UTC
- **Reserved Date**: August 28, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
index.php in eFiction before 2.0.7 allows remote attackers to bypass authentication and gain privileges by setting the (1) adminloggedin, (2) loggedin, and (3) level parameters to "1".
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [efiction-admin-security-bypass(28595)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28595)
2. [19717](http://www.securityfocus.com/bid/19717)
3. [2255](https://www.exploit-db.com/exploits/2255)
4. [28237](http://www.osvdb.org/28237)
5. [](http://efiction.org/forums/index.php?topic=3698)
6. [ADV-2006-3392](http://www.vupen.com/english/advisories/2006/3392)
7. [21625](http://secunia.com/advisories/21625) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-12889, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-12889 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-12889
- **State**: PUBLISHED
- **Published Date**: May 15, 2020 at 17:53 UTC
- **Last Updated**: August 04, 2024 at 12:11 UTC
- **Reserved Date**: May 15, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
MISP MISP-maltego 1.4.4 incorrectly shares a MISP connection across users in a remote-transform use case.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/MISP/MISP-maltego/commit/3ccde66dab4096ab5663e69f352992cc73e1160b) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.