System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-29996, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-29996 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-29996
- **State**: PUBLISHED
- **Published Date**: May 04, 2023 at 00:00 UTC
- **Last Updated**: January 29, 2025 at 19:36 UTC
- **Reserved Date**: April 07, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In NanoMQ v0.15.0-0, segment fault with Null Pointer Dereference occurs in the process of decoding subinfo_decode and unsubinfo_decode.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/emqx/nanomq/issues/1038) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-33162, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-33162 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-33162
- **State**: PUBLISHED
- **Published Date**: July 11, 2023 at 17:03 UTC
- **Last Updated**: February 28, 2025 at 20:01 UTC
- **Reserved Date**: May 17, 2023 at 21:16 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Excel Information Disclosure Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Microsoft - Microsoft Office 2019**
Affected versions:
- 19.0.0 (Status: affected)
**Microsoft - Microsoft Office 2019 for Mac**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Microsoft Office Online Server**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft 365 Apps for Enterprise**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Office LTSC for Mac 2021**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Office LTSC 2021**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Excel 2016**
Affected versions:
- 16.0.0.0 (Status: affected)
**Microsoft - Microsoft Excel 2013 Service Pack 1**
Affected versions:
- 15.0.0.0 (Status: affected)
### References
1. [Microsoft Excel Information Disclosure Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33162) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-37923, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-37923 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-37923
- **State**: PUBLISHED
- **Published Date**: November 30, 2022 at 19:16 UTC
- **Last Updated**: April 24, 2025 at 18:56 UTC
- **Reserved Date**: August 08, 2022 at 18:45 UTC
- **Assigned By**: hpe
### Vulnerability Description
Vulnerabilities in the Aruba EdgeConnect Enterprise command line interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise in Aruba EdgeConnect Enterprise Software version(s): ECOS 9.2.1.0 and below; ECOS 9.1.3.0 and below; ECOS 9.0.7.0 and below; ECOS 8.3.7.1 and below.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**Hewlett Packard Enterprise (HPE) - Aruba EdgeConnect Enterprise Software**
Affected versions:
- ECOS 9.2.1.0 and below; ECOS 9.1.3.0 and below; ECOS 9.0.7.0 and below; ECOS 8.3.7.1 and below; (Status: affected)
### References
1. [](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-018.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-14473, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-14473 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-14473
- **State**: PUBLISHED
- **Published Date**: August 03, 2018 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 09:29 UTC
- **Reserved Date**: July 20, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
OCS Inventory 2.4.1 lacks a proper XML parsing configuration, allowing the use of external entities. This issue can be exploited by an attacker sending a crafted HTTP request in order to exfiltrate information or cause a Denial of Service.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.tarlogic.com/en/blog/vulnerabilities-in-ocs-inventory-2-4-1/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-2086, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-2086 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-2086
- **State**: PUBLISHED
- **Published Date**: January 20, 2021 at 14:50 UTC
- **Last Updated**: September 26, 2024 at 18:19 UTC
- **Reserved Date**: December 09, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.18. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 6.0 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H).
### CVSS Metrics
- **CVSS Base Score**: 6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H`
### Affected Products
**Oracle Corporation - VM VirtualBox**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujan2021.html)
2. [GLSA-202101-15](https://security.gentoo.org/glsa/202101-15) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1000206, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1000206 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1000206
- **State**: PUBLISHED
- **Published Date**: November 17, 2017 at 15:00 UTC
- **Last Updated**: September 17, 2024 at 00:35 UTC
- **Reserved Date**: November 17, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
samtools htslib library version 1.4.0 and earlier is vulnerable to buffer overflow in the CRAM rANS codec resulting in potential arbitrary code execution
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/samtools/htslib/blob/1.4.1/NEWS) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-42380, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-42380 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-42380
- **State**: PUBLISHED
- **Published Date**: November 15, 2021 at 00:00 UTC
- **Last Updated**: April 23, 2025 at 19:23 UTC
- **Reserved Date**: October 14, 2021 at 00:00 UTC
- **Assigned By**: JFROG
### Vulnerability Description
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**busybox - busybox**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://jfrog.com/blog/unboxing-busybox-14-new-vulnerabilities-uncovered-by-claroty-and-jfrog/)
2. [FEDORA-2021-5a95823596](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQXGOGWBIYWOIVXJVRKHZR34UMEHQBXS/)
3. [FEDORA-2021-c52c0fe490](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T2TURBYYJGBMQTTN2DSOAIQGP7WCPGV/)
4. [](https://security.netapp.com/advisory/ntap-20211223-0002/)
5. [](https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-9204, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-9204 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-9204
- **State**: PUBLISHED
- **Published Date**: April 18, 2018 at 14:00 UTC
- **Last Updated**: September 16, 2024 at 17:49 UTC
- **Reserved Date**: August 16, 2017 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear MSM8909W, SD 210/SD 212/SD 205, SD 410/12, SD 615/16/SD 415, SD 808, and SD 810, if cchFriendlyName is greater than TZ_PR_MAX_NAME_LEN in function playready_leavedomain_generate_challenge(), a buffer overread occurs.
### Affected Products
**Qualcomm, Inc. - Snapdragon Mobile, Snapdragon Wear**
Affected versions:
- MSM8909W, SD 210/SD 212/SD 205, SD 410/12, SD 615/16/SD 415, SD 808, SD 810 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2018-04-01)
2. [103671](http://www.securityfocus.com/bid/103671) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-4986, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-4986 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-4986
- **State**: PUBLISHED
- **Published Date**: July 09, 2018 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 05:18 UTC
- **Reserved Date**: January 03, 2018 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
### Affected Products
**n/a - Adobe Acrobat and Reader 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier versions**
Affected versions:
- Adobe Acrobat and Reader 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier versions (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb18-09.html)
2. [1040920](http://www.securitytracker.com/id/1040920)
3. [104175](http://www.securityfocus.com/bid/104175) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-32113, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-32113 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-32113
- **State**: PUBLISHED
- **Published Date**: May 08, 2024 at 14:50 UTC
- **Last Updated**: February 13, 2025 at 17:52 UTC
- **Reserved Date**: April 11, 2024 at 06:42 UTC
- **Assigned By**: apache
### Vulnerability Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Apache OFBiz.This issue affects Apache OFBiz: before 18.12.13.
Users are recommended to upgrade to version 18.12.13, which fixes the issue.
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**Apache Software Foundation - Apache OFBiz**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://ofbiz.apache.org/download.html)
2. [](https://ofbiz.apache.org/security.html)
3. [](https://issues.apache.org/jira/browse/OFBIZ-13006)
4. [](https://lists.apache.org/thread/w6s60okgkxp2th1sr8vx0ndmgk68fqrd)
5. [](http://www.openwall.com/lists/oss-security/2024/05/09/1)
### Credits
- Qiyi Zhang (RacerZ) @secsys from Fudan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-47478, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-47478 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-47478
- **State**: PUBLISHED
- **Published Date**: May 22, 2024 at 08:19 UTC
- **Last Updated**: May 04, 2025 at 07:11 UTC
- **Reserved Date**: May 22, 2024 at 06:20 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
isofs: Fix out of bound access for corrupted isofs image
When isofs image is suitably corrupted isofs_read_inode() can read data
beyond the end of buffer. Sanity-check the directory entry length before
using it.
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 4.4.292 (Status: unaffected)
- 4.9.290 (Status: unaffected)
- 4.14.255 (Status: unaffected)
- 4.19.217 (Status: unaffected)
- 5.4.159 (Status: unaffected)
- 5.10.79 (Status: unaffected)
- 5.14.18 (Status: unaffected)
- 5.15.2 (Status: unaffected)
- 5.16 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/156ce5bb6cc43a80a743810199defb1dc3f55b7f)
2. [](https://git.kernel.org/stable/c/9ec33a9b8790c212cc926a88c5e2105f97f3f57e)
3. [](https://git.kernel.org/stable/c/afbd40f425227e661d991757e11cc4db024e761f)
4. [](https://git.kernel.org/stable/c/b0ddff8d68f2e43857a84dce54c3deab181c8ae1)
5. [](https://git.kernel.org/stable/c/6e80e9314f8bb52d9eabe1907698718ff01120f5)
6. [](https://git.kernel.org/stable/c/86d4aedcbc69c0f84551fb70f953c24e396de2d7)
7. [](https://git.kernel.org/stable/c/b2fa1f52d22c5455217b294629346ad23a744945)
8. [](https://git.kernel.org/stable/c/e7fb722586a2936b37bdff096c095c30ca06404d)
9. [](https://git.kernel.org/stable/c/e96a1866b40570b5950cda8602c2819189c62a48) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-2762, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-2762 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-2762
- **State**: PUBLISHED
- **Published Date**: August 13, 2009 at 16:00 UTC
- **Last Updated**: August 07, 2024 at 05:59 UTC
- **Reserved Date**: August 13, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
wp-login.php in WordPress 2.8.3 and earlier allows remote attackers to force a password reset for the first user in the database, possibly the administrator, via a key[] array variable in a resetpass (aka rp) action, which bypasses a check that assumes that $key is not an array.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://wordpress.org/development/2009/08/2-8-4-security-release/)
2. [](http://core.trac.wordpress.org/changeset/11798)
3. [9410](http://www.exploit-db.com/exploits/9410)
4. [wordpress-wplogin-security-bypass(52382)](https://exchange.xforce.ibmcloud.com/vulnerabilities/52382)
5. [20090810 WordPress <= 2.8.3 Remote admin reset password](http://archives.neohapsis.com/archives/fulldisclosure/2009-08/0114.html)
6. [36014](http://www.securityfocus.com/bid/36014)
7. [1022707](http://www.securitytracker.com/id?1022707)
8. [36237](http://secunia.com/advisories/36237) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-49397, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-49397 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-49397
- **State**: PUBLISHED
- **Published Date**: December 05, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 21:53 UTC
- **Reserved Date**: November 27, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/category/updateStatus.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/nightcloudos/new_cms/blob/main/CSRF%20exists%20at%20the%20change%20of%20column%20management%20status.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-24156, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-24156 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-24156
- **State**: PUBLISHED
- **Published Date**: April 05, 2021 at 18:27 UTC
- **Last Updated**: August 03, 2024 at 19:21 UTC
- **Reserved Date**: January 14, 2021 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
Stored Cross-Site Scripting vulnerabilities in Testimonial Rotator 3.0.3 allow low privileged users (Contributor) to inject arbitrary JavaScript code or HTML without approval. This could lead to privilege escalation
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Unknown - Testimonial Rotator**
Affected versions:
- 3.0.3 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/8b6f4a77-4008-4730-9a91-fa055a8b3e68)
2. [](https://mega.nz/file/ftVSmRCC#ctqUg89CKszEuLO3eeQVazUStTPvoQD6LlbWNSMa7uA)
### Credits
- Nguyen Anh Tien - SunCSR (Sun* Cyber Security Research) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-5694, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-5694 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-5694
- **State**: PUBLISHED
- **Published Date**: January 14, 2018 at 04:00 UTC
- **Last Updated**: August 05, 2024 at 05:40 UTC
- **Reserved Date**: January 13, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The callforward module in User Control Panel (UCP) in Nicolas Gudino (aka Asternic) Flash Operator Panel (FOP) 2.31.03 allows remote authenticated users to execute arbitrary commands via the command parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.vulnerability-lab.com/get_content.php?id=1907) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-0285, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-0285 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-0285
- **State**: PUBLISHED
- **Published Date**: March 03, 2025 at 16:25 UTC
- **Last Updated**: April 15, 2025 at 15:15 UTC
- **Reserved Date**: January 06, 2025 at 19:14 UTC
- **Assigned By**: certcc
### Vulnerability Description
Various Paragon Software products contain an arbitrary kernel memory mapping vulnerability within biontdrv.sys that is caused by a failure to properly validate the length of user supplied data, which can allow an attacker to perform privilege escalation exploits.
### Affected Products
**Paragon Software - Partition Manager**
Affected versions:
- 15 (Status: affected)
**Paragon Software - Hard Disk Manager**
Affected versions:
- 15 (Status: affected)
**Paragon Software - Backup and Recovery**
Affected versions:
- 15 (Status: affected)
**Paragon Software - Paragon Drive Copy**
Affected versions:
- 15 (Status: affected)
**Paragon Software - Disk Wiper**
Affected versions:
- 15 (Status: affected)
**Paragon Software - Migrate OS to SSD**
Affected versions:
- 4 (Status: affected)
### References
1. [](https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys)
2. [](https://www.kb.cert.org/vuls/id/726882)
3. [](https://www.paragon-software.com/support/#patches) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-6910, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-6910 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-6910
- **State**: PUBLISHED
- **Published Date**: August 06, 2009 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 11:49 UTC
- **Reserved Date**: August 06, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Services 5.x before 5.x-0.92 and 6.x before 6.x-0.13, a module for Drupal, does not use timeouts for signed requests, which allows remote attackers to impersonate other users and gain privileges via a replay attack that sends the same request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [50743](http://osvdb.org/50743)
2. [services-timeout-security-bypass(52441)](https://exchange.xforce.ibmcloud.com/vulnerabilities/52441)
3. [32894](http://www.securityfocus.com/bid/32894)
4. [](http://drupal.org/node/348295) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-3870, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-3870 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-3870
- **State**: REJECTED
- **Published Date**: June 01, 2009 at 20:00 UTC
- **Last Updated**: September 16, 2024 at 19:10 UTC
- **Reserved Date**: June 01, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-1052, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-1052 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-1052
- **State**: PUBLISHED
- **Published Date**: February 21, 2007 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 12:43 UTC
- **Reserved Date**: February 21, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in index.php in PBLang (PBL) 4.60 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the dbpath parameter, a different vector than CVE-2006-5062. NOTE: this issue has been disputed by a reliable third party for 4.65, stating that the dbpath variable is initialized in an included file that is created upon installation
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [33737](http://osvdb.org/33737)
2. [20070216 PBLang 4.60 <= (index.php) Remote File Include Vulnerability](http://www.securityfocus.com/archive/1/460315/100/0/threaded)
3. [20070216 PBLang 4.60 <= (index.php) Remote File Include Vulnerability](http://attrition.org/pipermail/vim/2007-February/001356.html)
4. [2269](http://securityreason.com/securityalert/2269) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-52471, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-52471 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-52471
- **State**: PUBLISHED
- **Published Date**: February 25, 2024 at 08:16 UTC
- **Last Updated**: May 04, 2025 at 07:37 UTC
- **Reserved Date**: February 20, 2024 at 12:30 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
ice: Fix some null pointer dereference issues in ice_ptp.c
devm_kasprintf() returns a pointer to dynamically allocated memory
which can be NULL upon failure.
### Affected Products
**Linux - Linux**
Affected versions:
- d938a8cca88a5f02f523f95fe3d2d1214f4b4a8d (Status: affected)
- d938a8cca88a5f02f523f95fe3d2d1214f4b4a8d (Status: affected)
**Linux - Linux**
Affected versions:
- 6.7 (Status: affected)
- 0 (Status: unaffected)
- 6.7.2 (Status: unaffected)
- 6.8 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/3cd9b9bee33f39f6c6d52360fe381b89a7b12695)
2. [](https://git.kernel.org/stable/c/3027e7b15b02d2d37e3f82d6b8404f6d37e3b8cf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-4132, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-4132 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-4132
- **State**: PUBLISHED
- **Published Date**: August 14, 2006 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 18:57 UTC
- **Reserved Date**: August 14, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ArcSoft MMS Composer 1.5.5.6 and possibly earlier, and 2.0.0.13 and possibly earlier, allow remote attackers to cause a denial of service (resource exhaustion and application crash) via WAPPush messages to UDP port UDP 2948.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [19451](http://www.securityfocus.com/bid/19451)
2. [mmscomposer-wappush-dos(28344)](https://exchange.xforce.ibmcloud.com/vulnerabilities/28344)
3. [1387](http://securityreason.com/securityalert/1387)
4. [2156](https://www.exploit-db.com/exploits/2156)
5. [20060810 PocketPC MMS - Remote Code Injection/Execution Vulnerability andDenial-of-Service](http://www.securityfocus.com/archive/1/442841/100/0/threaded)
6. [](http://www.arcsoft.com/support/downloads/download_patches/mms.asp)
7. [20060809 PocketPC MMS - Remote Code Injection/Execution Vulnerability and Denial-of-Service](http://lists.grok.org.uk/pipermail/full-disclosure/2006-August/048614.html)
8. [](http://www.mulliner.org/pocketpc/CollinMulliner_defcon14_pocketpcphones.pdf)
9. [21426](http://secunia.com/advisories/21426) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-1931, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-1931 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-1931
- **State**: PUBLISHED
- **Published Date**: January 30, 2020 at 17:38 UTC
- **Last Updated**: August 04, 2024 at 06:53 UTC
- **Reserved Date**: December 02, 2019 at 00:00 UTC
- **Assigned By**: apache
### Vulnerability Description
A command execution issue was found in Apache SpamAssassin prior to 3.4.3. Carefully crafted nefarious Configuration (.cf) files can be configured to run system commands similar to CVE-2018-11805. This issue is less stealthy and attempts to exploit the issue will throw warnings. Thanks to Damian Lukowski at credativ for reporting the issue ethically. With this bug unpatched, exploits can be injected in a number of scenarios though doing so remotely is difficult. In addition to upgrading to SA 3.4.4, we again recommend that users should only use update channels or 3rd party .cf files from trusted places.
### Affected Products
**Apache Software Foundation - Apache SpamAssassin**
Affected versions:
- prior to 3.4.3 (Status: affected)
### References
1. [](https://bz.apache.org/SpamAssassin/show_bug.cgi?id=7784)
2. [DSA-4615](https://www.debian.org/security/2020/dsa-4615)
3. [20200203 [SECURITY] [DSA 4615-1] spamassassin security update](https://seclists.org/bugtraq/2020/Feb/1)
4. [USN-4265-1](https://usn.ubuntu.com/4265-1/)
5. [USN-4265-2](https://usn.ubuntu.com/4265-2/)
6. [FEDORA-2020-24dac7d890](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B7SY2LUSH2X3IUXN4EQQ5A6QVUFYIV3D/)
7. [FEDORA-2020-bd20036cdc](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VOVVKFP2G2AF5GHAB4WMHOEX76A3H6CE/)
8. [[debian-lts-announce] 20200218 [SECURITY] [DLA 2107-1] spamassassin security update](https://lists.debian.org/debian-lts-announce/2020/02/msg00015.html)
9. [openSUSE-SU-2020:0446](http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00003.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-5813, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-5813 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-5813
- **State**: PUBLISHED
- **Published Date**: February 15, 2018 at 22:00 UTC
- **Last Updated**: September 16, 2024 at 19:35 UTC
- **Reserved Date**: February 01, 2017 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
A remote unauthenticated access vulnerability in HPE Network Automation version 9.1x, 9.2x, 10.0x, 10.1x and 10.2x were found.
### Affected Products
**Hewlett Packard Enterprise - Network Automation**
Affected versions:
- 9.1x, 9.2x, 10.0x, 10.1x and 10.2x (Status: affected)
### References
1. [](https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03740en_us)
2. [98331](http://www.securityfocus.com/bid/98331)
3. [1038407](http://www.securitytracker.com/id/1038407) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-0973, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-0973 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-0973
- **State**: PUBLISHED
- **Published Date**: February 10, 2016 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 22:38 UTC
- **Reserved Date**: December 22, 2015 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Use-after-free vulnerability in the URLRequest object implementation in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allows attackers to execute arbitrary code via a URLLoader.load call, a different vulnerability than CVE-2016-0974, CVE-2016-0975, CVE-2016-0982, CVE-2016-0983, and CVE-2016-0984.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SUSE-SU-2016:0400](http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html)
2. [1034970](http://www.securitytracker.com/id/1034970)
3. [](http://zerodayinitiative.com/advisories/ZDI-16-161/)
4. [GLSA-201603-07](https://security.gentoo.org/glsa/201603-07)
5. [RHSA-2016:0166](http://rhn.redhat.com/errata/RHSA-2016-0166.html)
6. [openSUSE-SU-2016:0415](http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html)
7. [openSUSE-SU-2016:0412](http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html)
8. [](https://helpx.adobe.com/security/products/flash-player/apsb16-04.html)
9. [SUSE-SU-2016:0398](http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-3462, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-3462 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-3462
- **State**: PUBLISHED
- **Published Date**: December 26, 2019 at 20:14 UTC
- **Last Updated**: August 06, 2024 at 20:05 UTC
- **Reserved Date**: June 14, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw was found in SSSD version 1.9.0. The SSSD's access-provider logic causes the result of the HBAC rule processing to be ignored in the event that the access-provider is also handling the setup of the user's SELinux user context.
### Affected Products
**sssd - sssd**
Affected versions:
- 1.9.0 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-3462)
2. [](https://access.redhat.com/security/cve/cve-2012-3462)
3. [](https://pagure.io/SSSD/sssd/issue/1470) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-2151, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-2151 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-2151
- **State**: REJECTED
- **Published Date**: January 22, 2019 at 20:00 UTC
- **Last Updated**: January 22, 2019 at 17:57 UTC
- **Reserved Date**: December 13, 2017 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-37988, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-37988 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-37988
- **State**: PUBLISHED
- **Published Date**: August 10, 2023 at 10:39 UTC
- **Last Updated**: February 13, 2025 at 17:01 UTC
- **Reserved Date**: July 11, 2023 at 12:30 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Creative Solutions Contact Form Generator plugin <= 2.5.5 versions.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Creative Solutions - Contact Form Generator**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/contact-form-generator/wordpress-contact-form-generator-plugin-2-5-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
2. [](http://packetstormsecurity.com/files/174896/WordPress-Contact-Form-Generator-2.5.5-Cross-Site-Scripting.html)
### Credits
- Arvandy (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-6502, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-6502 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-6502
- **State**: REJECTED
- **Published Date**: November 05, 2020 at 22:09 UTC
- **Last Updated**: November 05, 2020 at 22:09 UTC
- **Reserved Date**: November 04, 2013 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-7031, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-7031 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-7031
- **State**: PUBLISHED
- **Published Date**: May 24, 2019 at 18:02 UTC
- **Last Updated**: August 04, 2024 at 20:38 UTC
- **Reserved Date**: January 28, 2019 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
### Affected Products
**Adobe - Adobe Acrobat and Reader**
Affected versions:
- 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier versions (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/acrobat/apsb19-07.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-2420, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-2420 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-2420
- **State**: PUBLISHED
- **Published Date**: May 30, 2024 at 17:22 UTC
- **Last Updated**: August 01, 2024 at 19:11 UTC
- **Reserved Date**: March 13, 2024 at 13:55 UTC
- **Assigned By**: Carrier
### Vulnerability Description
LenelS2 NetBox access control and event monitoring system was discovered to contain Hardcoded Credentials in versions prior to and including 5.6.1 which allows an attacker to bypass authentication requirements.
### Weakness Classification (CWE)
- CWE-259: Security Weakness
### Affected Products
**LenelS2 - NetBox**
Affected versions:
- All (Status: affected)
### References
1. [](https://www.corporate.carrier.com/Images/CARR-PSA-2024-01-NetBox_tcm558-227956.pdf)
2. [](https://www.cisa.gov/news-events/ics-advisories/icsa-24-151-01)
### Credits
- Claroty Team82 |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-20884, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-20884 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-20884
- **State**: PUBLISHED
- **Published Date**: June 19, 2020 at 16:42 UTC
- **Last Updated**: August 05, 2024 at 02:53 UTC
- **Reserved Date**: June 19, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Mattermost Server before 5.8.0. It allows attackers to partially attach a file to more than one post.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://mattermost.com/security-updates/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-11320, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-11320 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-11320
- **State**: PUBLISHED
- **Published Date**: April 18, 2019 at 16:47 UTC
- **Last Updated**: August 04, 2024 at 22:48 UTC
- **Reserved Date**: April 18, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In Motorola CX2 1.01 and M2 1.01, users can access the router's /priv_mgt.html web page to launch telnetd, as demonstrated by the 192.168.51.1 address.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/TeamSeri0us/pocs/blob/master/iot/motorola.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-28684, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-28684 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-28684
- **State**: PUBLISHED
- **Published Date**: March 23, 2023 at 11:26 UTC
- **Last Updated**: February 20, 2025 at 21:23 UTC
- **Reserved Date**: March 20, 2023 at 19:59 UTC
- **Assigned By**: jenkins
### Vulnerability Description
Jenkins remote-jobs-view-plugin Plugin 0.0.3 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
### Affected Products
**Jenkins Project - Jenkins remote-jobs-view-plugin Plugin**
Affected versions:
- 0 (Status: affected)
### References
1. [Jenkins Security Advisory 2023-03-21](https://www.jenkins.io/security/advisory/2023-03-21/#SECURITY-2956) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-10963, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-10963 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-10963
- **State**: PUBLISHED
- **Published Date**: May 10, 2018 at 02:00 UTC
- **Last Updated**: August 05, 2024 at 07:54 UTC
- **Reserved Date**: May 09, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The TIFFWriteDirectorySec() function in tif_dirwrite.c in LibTIFF through 4.0.9 allows remote attackers to cause a denial of service (assertion failure and application crash) via a crafted file, a different vulnerability than CVE-2017-13726.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://bugzilla.maptools.org/show_bug.cgi?id=2795)
2. [USN-3864-1](https://usn.ubuntu.com/3864-1/)
3. [DSA-4349](https://www.debian.org/security/2018/dsa-4349)
4. [[debian-lts-announce] 20180702 [SECURITY] [DLA 1411-1] tiff security update](https://lists.debian.org/debian-lts-announce/2018/07/msg00002.html)
5. [RHSA-2019:2053](https://access.redhat.com/errata/RHSA-2019:2053) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-0496, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-0496 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0496
- **State**: PUBLISHED
- **Published Date**: June 12, 2018 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 03:28 UTC
- **Reserved Date**: November 27, 2017 at 00:00 UTC
- **Assigned By**: debian
### Vulnerability Description
Directory traversal issues in the D-Mod extractor in DFArc and DFArc2 (as well as in RTsoft's Dink Smallwood HD / ProtonSDK version) before 3.14 allow an attacker to overwrite arbitrary files on the user's system.
### Affected Products
**n/a - DFArc2 before 3.14 unknown**
Affected versions:
- DFArc2 before 3.14 unknown (Status: affected)
### References
1. [](https://savannah.gnu.org/forum/forum.php?forum_id=9169)
2. [](https://git.savannah.gnu.org/cgit/freedink/dfarc.git/commit/?id=40cc957f52e772f45125126439ba9333cf2d2998)
3. [[debian-lts-announce] 20190224 [SECURITY] [DLA 1686-1] freedink-dfarc security update](https://lists.debian.org/debian-lts-announce/2019/02/msg00033.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-21354, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-21354 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21354
- **State**: PUBLISHED
- **Published Date**: March 08, 2021 at 19:05 UTC
- **Last Updated**: August 03, 2024 at 18:09 UTC
- **Reserved Date**: December 22, 2020 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Pollbot is open source software which "frees its human masters from the toilsome task of polling for the state of things during the Firefox release process." In Pollbot before version 1.4.4 there is an open redirection vulnerability in the path of "https://pollbot.services.mozilla.com/". An attacker can redirect anyone to malicious sites. To Reproduce type in this URL: "https://pollbot.services.mozilla.com//evil.com/". Affected versions will redirect to that website when you inject a payload like "//evil.com/". This is fixed in version 1.4.4.
### CVSS Metrics
- **CVSS Base Score**: 7.4/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N`
### Weakness Classification (CWE)
- CWE-601: URL Redirection to Untrusted Site
### Affected Products
**mozilla - PollBot**
Affected versions:
- < 1.4.4 (Status: affected)
### References
1. [](https://github.com/mozilla/PollBot/security/advisories/GHSA-jhgx-wmq8-jc24)
2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1694684)
3. [](https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html)
4. [](https://github.com/mozilla/PollBot/releases/tag/v1.4.4)
5. [](https://github.com/mozilla/PollBot/pull/333)
6. [](https://github.com/mozilla/PollBot/commit/6db74a4fcbff258c7cdf51a6ff0724fc10c485e5) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-1330, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-1330 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-1330
- **State**: PUBLISHED
- **Published Date**: March 21, 2006 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 17:03 UTC
- **Reserved Date**: March 20, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in phpWebsite 0.83 and earlier allow remote attackers to execute arbitrary SQL commands via the sid parameter to (1) friend.php or (2) article.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20060318 phpWebsite <= SQL Injection (friend.php) & (article.php)](http://www.securityfocus.com/archive/1/428156)
2. [20060413 Re: phpWebsite <= SQL Injection (friend.php) & (article.php)](http://www.securityfocus.com/archive/1/430870/100/0/threaded)
3. [17150](http://www.securityfocus.com/bid/17150)
4. [ADV-2006-1039](http://www.vupen.com/english/advisories/2006/1039)
5. [19315](http://secunia.com/advisories/19315)
6. [phpwebsite-multiple-sql-injection(25328)](https://exchange.xforce.ibmcloud.com/vulnerabilities/25328) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-4250, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-4250 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4250
- **State**: PUBLISHED
- **Published Date**: August 08, 2007 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 14:46 UTC
- **Reserved Date**: August 08, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The isChecked function in Toolbar.DLL in Advanced Searchbar before 3.33 allows remote attackers to cause a denial of service (NULL dereference and browser crash) via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20070804 [ELEYTT] 4SIERPIEN2007](http://www.securityfocus.com/archive/1/475534/100/0/threaded)
2. [advancedsearchbar-ischecked-dos(35805)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35805)
3. [20070809 vendor ACK - Advanced Searchbar - CVE-2007-4250](http://www.attrition.org/pipermail/vim/2007-August/001756.html)
4. [3004](http://securityreason.com/securityalert/3004)
5. [20070809 Re: [ELEYTT] 4SIERPIEN2007](http://www.securityfocus.com/archive/1/475932/100/100/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-13774, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-13774 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-13774
- **State**: PUBLISHED
- **Published Date**: November 12, 2020 at 19:22 UTC
- **Last Updated**: August 04, 2024 at 12:25 UTC
- **Reserved Date**: June 02, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An unrestricted file-upload issue in EditLaunchPadDialog.aspx in Ivanti Endpoint Manager 2019.1 and 2020.1 allows an authenticated attacker to gain remote code execution by uploading a malicious aspx file. The issue is caused by insufficient file extension validation and insecure file operations on the uploaded image, which upon failure will leave the temporarily created files in an accessible location on the server.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://labs.jumpsec.com/advisory-cve-2020-13774-ivanti-uem-rce/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-2233, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-2233 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-2233
- **State**: PUBLISHED
- **Published Date**: November 13, 2019 at 17:39 UTC
- **Last Updated**: August 04, 2024 at 18:42 UTC
- **Reserved Date**: December 10, 2018 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In getUserCount and getCount of UserSwitcherController.java, there is possible new user creation due to a logic error. This could lead to local escalation of privilege for an attacker who has physical access to the device with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-140486529
### Affected Products
**n/a - Android**
Affected versions:
- Android-10 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2019-11-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-7622, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-7622 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-7622
- **State**: PUBLISHED
- **Published Date**: September 06, 2024 at 13:55 UTC
- **Last Updated**: September 06, 2024 at 14:12 UTC
- **Reserved Date**: August 08, 2024 at 17:42 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Revision Manager TMC plugin for WordPress is vulnerable to unauthorized arbitrary email sending due to a missing capability check on the _a_ajaxQuickEmailTestCallback() function in all versions up to, and including, 2.8.19. This makes it possible for authenticated attackers, with subscriber-level access and above, to send emails with arbitrary content to any individual through the vulnerable web server.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**themastercut - Revision Manager TMC**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/2c8a6ff9-6aa8-4e0f-b058-759561a55508?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/revision-manager-tmc/trunk/src/Components/Notifications.php#L357)
3. [](https://plugins.trac.wordpress.org/changeset/3147298/)
### Credits
- Lucio Sá |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-6660, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-6660 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-6660
- **State**: PUBLISHED
- **Published Date**: August 04, 2015 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 21:36 UTC
- **Reserved Date**: September 29, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
GE Healthcare Precision MPi has a password of (1) orion for the serviceapp user, (2) orion for the clinical operator user, and (3) PlatinumOne for the administrator user, which has unspecified impact and attack vectors. NOTE: it is not clear whether these passwords are default, hardcoded, or dependent on another system or product that requires a fixed value.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://apps.gehealthcare.com/servlet/ClientServlet/2407310-100+Vol.+F_Rev1.pdf?REQ=RAA&DIRECTION=2407310-100+Vol.+F&FILENAME=2407310-100%2BVol.%2BF_Rev1.pdf&FILEREV=1&DOCREV_ORG=1)
2. [](http://www.forbes.com/sites/thomasbrewster/2015/07/10/vulnerable-breasts/)
3. [](https://twitter.com/digitalbond/status/619250429751222277)
4. [](https://ics-cert.us-cert.gov/advisories/ICSMA-18-037-02) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-2742, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-2742 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-2742
- **State**: PUBLISHED
- **Published Date**: March 25, 2025 at 06:31 UTC
- **Last Updated**: March 25, 2025 at 13:15 UTC
- **Reserved Date**: March 24, 2025 at 14:44 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical was found in zhijiantianya ruoyi-vue-pro 2.4.1. This vulnerability affects unknown code of the file /admin-api/mp/material/upload-permanent of the component Material Upload Interface. The manipulation of the argument File leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**zhijiantianya - ruoyi-vue-pro**
Affected versions:
- 2.4.1 (Status: affected)
### References
1. [VDB-300844 | zhijiantianya ruoyi-vue-pro Material Upload Interface upload-permanent path traversal](https://vuldb.com/?id.300844)
2. [VDB-300844 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.300844)
3. [Submit #519691 | zhijiantianya ruoyi-vue-pro 2.4.1 Arbitrary file deletion vulnerability --uploadPermanentMaterial](https://vuldb.com/?submit.519691)
4. [](https://github.com/uglory-gll/javasec/blob/main/ruoyi-vue-pro.md#5arbitrary-file-deletion-vulnerability---uploadpermanentmaterial)
### Credits
- uglory (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-11749, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-11749 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-11749
- **State**: PUBLISHED
- **Published Date**: July 13, 2020 at 14:11 UTC
- **Last Updated**: August 04, 2024 at 11:41 UTC
- **Reserved Date**: April 14, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Pandora FMS 7.0 NG <= 746 suffers from Multiple XSS vulnerabilities in different browser views. A network administrator scanning a SNMP device can trigger a Cross Site Scripting (XSS), which can run arbitrary code to allow Remote Code Execution as root or apache2.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://pandorafms.com/downloads/whats-new-747-EN.pdf)
2. [](https://medium.com/%40tehwinsam/multiple-xss-on-pandorafms-7-0-ng-744-64b244b8523c)
3. [](https://packetstormsecurity.com/files/158389/Pandora-FMS-7.0-NG-746-Script-Insertion-Code-Execution.htmlPoC)
4. [](https://www.exploit-db.com/exploits/48707) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-32442, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-32442 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-32442
- **State**: PUBLISHED
- **Published Date**: April 18, 2025 at 15:59 UTC
- **Last Updated**: April 28, 2025 at 17:39 UTC
- **Reserved Date**: April 08, 2025 at 10:54 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Fastify is a fast and low overhead web framework, for Node.js. In versions 5.0.0 to 5.3.0 as well as version 4.9.0, applications that specify different validation strategies for different content types have a possibility to bypass validation by providing a _slightly altered_ content type such as with different casing or altered whitespacing before `;`. This was patched in v5.3.1, but the initial patch did not cover all problems. This has been fully patched in v5.3.2 and v4.9.1. A workaround involves not specifying individual content types in the schema.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N`
### Weakness Classification (CWE)
- CWE-1287: Security Weakness
### Affected Products
**fastify - fastify**
Affected versions:
- >= 5.0.0, < 5.3.2 (Status: affected)
- = 4.9.0 (Status: affected)
### References
1. [https://github.com/fastify/fastify/security/advisories/GHSA-mg2h-6x62-wpwc](https://github.com/fastify/fastify/security/advisories/GHSA-mg2h-6x62-wpwc)
2. [https://github.com/fastify/fastify/commit/436da4c06dfbbb8c24adee3a64de0c51e4f47418](https://github.com/fastify/fastify/commit/436da4c06dfbbb8c24adee3a64de0c51e4f47418)
3. [https://github.com/fastify/fastify/commit/f3d2bcb3963cd570a582e5d39aab01a9ae692fe4](https://github.com/fastify/fastify/commit/f3d2bcb3963cd570a582e5d39aab01a9ae692fe4)
4. [https://hackerone.com/reports/3087928](https://hackerone.com/reports/3087928) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-3198, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-3198 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-3198
- **State**: PUBLISHED
- **Published Date**: October 17, 2012 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 19:57 UTC
- **Reserved Date**: June 06, 2012 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.51 and 8.52 allows remote authenticated users to affect availability via unknown vectors related to Query.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [51001](http://secunia.com/advisories/51001)
2. [](http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html)
3. [1027671](http://www.securitytracker.com/id?1027671)
4. [MDVSA-2013:150](http://www.mandriva.com/security/advisories?name=MDVSA-2013:150) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-14122, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-14122 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-14122
- **State**: PUBLISHED
- **Published Date**: April 16, 2020 at 10:46 UTC
- **Last Updated**: August 05, 2024 at 00:12 UTC
- **Reserved Date**: July 19, 2019 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
Memory failure in SKB if it fails to to add the requested padding to the skb in low memory targets or targets with major memory fragmentation in Snapdragon Auto, Snapdragon Mobile in Saipan, SM8150, SM8250, SXR2130
### Affected Products
**Qualcomm, Inc. - Snapdragon Auto, Snapdragon Mobile**
Affected versions:
- Saipan, SM8150, SM8250, SXR2130 (Status: affected)
### References
1. [](https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-3595, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-3595 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-3595
- **State**: REJECTED
- **Published Date**: July 06, 2007 at 18:00 UTC
- **Last Updated**: December 06, 2007 at 10:00 UTC
- **Reserved Date**: July 06, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-23369, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-23369 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-23369
- **State**: PUBLISHED
- **Published Date**: April 12, 2021 at 13:10 UTC
- **Last Updated**: September 16, 2024 at 22:46 UTC
- **Reserved Date**: January 08, 2021 at 00:00 UTC
- **Assigned By**: snyk
### Vulnerability Description
The package handlebars before 4.7.7 are vulnerable to Remote Code Execution (RCE) when selecting certain compiling options to compile templates coming from an untrusted source.
### CVSS Metrics
- **CVSS Base Score**: 5.6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C`
### Affected Products
**n/a - handlebars**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://snyk.io/vuln/SNYK-JS-HANDLEBARS-1056767)
2. [](https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074950)
3. [](https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074951)
4. [](https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074952)
5. [](https://github.com/handlebars-lang/handlebars.js/commit/b6d3de7123eebba603e321f04afdbae608e8fea8)
6. [](https://github.com/handlebars-lang/handlebars.js/commit/f0589701698268578199be25285b2ebea1c1e427)
7. [](https://security.netapp.com/advisory/ntap-20210604-0008/)
### Credits
- Francois Lajeunesse-Robert |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-56602, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-56602 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-56602
- **State**: PUBLISHED
- **Published Date**: December 27, 2024 at 14:51 UTC
- **Last Updated**: May 04, 2025 at 09:59 UTC
- **Reserved Date**: December 27, 2024 at 14:03 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
net: ieee802154: do not leave a dangling sk pointer in ieee802154_create()
sock_init_data() attaches the allocated sk object to the provided sock
object. If ieee802154_create() fails later, the allocated sk object is
freed, but the dangling pointer remains in the provided sock object, which
may allow use-after-free.
Clear the sk pointer in the sock object on error.
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.4.287 (Status: unaffected)
- 5.10.231 (Status: unaffected)
- 5.15.174 (Status: unaffected)
- 6.1.120 (Status: unaffected)
- 6.6.66 (Status: unaffected)
- 6.12.5 (Status: unaffected)
- 6.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/1d5fe782c0ff068d80933f9cfd0fd39d5434bbc9)
2. [](https://git.kernel.org/stable/c/14959fd7538b3be6d7617d9e60e404d6a8d4fd1f)
3. [](https://git.kernel.org/stable/c/2b46994a6e76c8cc5556772932b9b60d03a55cd8)
4. [](https://git.kernel.org/stable/c/e8bd6c5f5dc2234b4ea714380aedeea12a781754)
5. [](https://git.kernel.org/stable/c/b4982fbf13042e3bb33e04eddfea8b1506b5ea65)
6. [](https://git.kernel.org/stable/c/03caa9bfb9fde97fb53d33decd7364514e6825cb)
7. [](https://git.kernel.org/stable/c/b4fcd63f6ef79c73cafae8cf4a114def5fc3d80d) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1503, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1503 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1503
- **State**: PUBLISHED
- **Published Date**: October 10, 2017 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 13:32 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 is vulnerable to HTTP response splitting attacks. A remote attacker could exploit this vulnerability using specially-crafted URL to cause the server to return a split response, once the URL is clicked. This would allow the attacker to perform further attacks, such as Web cache poisoning, cross-site scripting, and possibly obtain sensitive information. IBM X-Force ID: 129578.
### Affected Products
**IBM - IBM WebSphere Application Server **
Affected versions:
- 7.0, 8.0, 8.5, 9.0 (Status: affected)
### References
1. [101234](http://www.securityfocus.com/bid/101234)
2. [1039521](http://www.securitytracker.com/id/1039521)
3. [](http://www-01.ibm.com/support/docview.wss?uid=swg22006815)
4. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/129578) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-5421, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-5421 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5421
- **State**: PUBLISHED
- **Published Date**: September 19, 2020 at 03:45 UTC
- **Last Updated**: September 17, 2024 at 03:58 UTC
- **Reserved Date**: January 03, 2020 at 00:00 UTC
- **Assigned By**: pivotal
### Vulnerability Description
In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jsessionid path parameter.
### Affected Products
**Spring by VMware - Spring Framework**
Affected versions:
- 4.3 (Status: affected)
- 5.0 (Status: affected)
- 5.1 (Status: affected)
- 5.2 (Status: affected)
### References
1. [](https://tanzu.vmware.com/security/cve-2020-5421)
2. [[ranger-dev] 20201007 Re: Review Request 72934: RANGER-3022: Upgrade Spring framework to version 4.3.29.RELEASE](https://lists.apache.org/thread.html/re014a49d77f038ba70e5e9934d400af6653e8c9ac110d32b1254127e%40%3Cdev.ranger.apache.org%3E)
3. [[ambari-issues] 20201013 [jira] [Created] (AMBARI-25571) Vulnerable Spring components in Ambari - CVE-2020-5398, CVE-2020-5421](https://lists.apache.org/thread.html/r1eccdbd7986618a7319ee7a533bd9d9bf6e8678e59dd4cca9b5b2d7a%40%3Cissues.ambari.apache.org%3E)
4. [[ambari-dev] 20201019 [GitHub] [ambari] dlysnichenko opened a new pull request #3246: AMBARI-25571. Vulnerable Spring components in Ambari - CVE-2020-5398, CVE-2020-5421](https://lists.apache.org/thread.html/r9f13cccb214495e14648d2c9b8f2c6072fd5219e74502dd35ede81e1%40%3Cdev.ambari.apache.org%3E)
5. [[ambari-dev] 20201019 [GitHub] [ambari] dlysnichenko merged pull request #3246: AMBARI-25571. Vulnerable Spring components in Ambari - CVE-2020-5398, CVE-2020-5421](https://lists.apache.org/thread.html/r8b496b1743d128e6861ee0ed3c3c48cc56c505b38f84fa5baf7ae33a%40%3Cdev.ambari.apache.org%3E)
6. [[ambari-commits] 20201019 [ambari] branch branch-2.7 updated: AMBARI-25571. Vulnerable Spring components in Ambari - CVE-2020-5398, CVE-2020-5421 (dlysnichenko) (#3246)](https://lists.apache.org/thread.html/r1c679c43fa4f7846d748a937955c7921436d1b315445978254442163%40%3Ccommits.ambari.apache.org%3E)
7. [[ambari-issues] 20201021 [jira] [Resolved] (AMBARI-25571) Vulnerable Spring components in Ambari - CVE-2020-5398, CVE-2020-5421](https://lists.apache.org/thread.html/r5c95eff679dfc642e9e4ab5ac6d202248a59cb1e9457cfbe8b729ac5%40%3Cissues.ambari.apache.org%3E)
8. [[hive-dev] 20201022 [jira] [Created] (HIVE-24303) Upgrade spring framework to 4.3.29.RELEASE+ due to CVE-2020-5421](https://lists.apache.org/thread.html/rf00d8f4101a1c1ea4de6ea1e09ddf7472cfd306745c90d6da87ae074%40%3Cdev.hive.apache.org%3E)
9. [[hive-issues] 20201022 [jira] [Assigned] (HIVE-24303) Upgrade spring framework to 4.3.29.RELEASE+ due to CVE-2020-5421](https://lists.apache.org/thread.html/rc9efaf6db98bee19db1bc911d0fa442287dac5cb229d4aaa08b6a13d%40%3Cissues.hive.apache.org%3E)
10. [[hive-issues] 20201022 [jira] [Updated] (HIVE-24303) Upgrade spring framework to 4.3.29.RELEASE+ due to CVE-2020-5421](https://lists.apache.org/thread.html/r7e6a213eea7f04fc6d9e3bd6eb8d68c4df92a22e956e95cb2c482865%40%3Cissues.hive.apache.org%3E)
11. [[pulsar-commits] 20201022 [GitHub] [pulsar] Ghatage opened a new pull request #8355: [Issue 8354][pulsar-io] Upgrade spring framework version to patch CVE-2020-5421](https://lists.apache.org/thread.html/r503e64b43a57fd68229cac4a869d1a9a2eac9e75f8719cad3a840211%40%3Ccommits.pulsar.apache.org%3E)
12. [[pulsar-commits] 20201023 [GitHub] [pulsar] Ghatage commented on pull request #8355: [Issue 8354][pulsar-io] Upgrade spring framework version to patch CVE-2020-5421](https://lists.apache.org/thread.html/r918caad55dcc640a16753b00d8d6acb90b4e36de4b6156d0867246ec%40%3Ccommits.pulsar.apache.org%3E)
13. [[pulsar-commits] 20201026 [GitHub] [pulsar] wolfstudy commented on pull request #8355: [Issue 8354][pulsar-io] Upgrade spring framework version to patch CVE-2020-5421](https://lists.apache.org/thread.html/r3589ed0d18edeb79028615080d5a0e8878856436bb91774a3196d9eb%40%3Ccommits.pulsar.apache.org%3E)
14. [[pulsar-commits] 20201028 [GitHub] [pulsar] merlimat merged pull request #8355: [Issue 8354][pulsar-io] Upgrade spring framework version to patch CVE-2020-5421](https://lists.apache.org/thread.html/rb18ed999153ef0f0cb7af03efe0046c42c7242fd77fbd884a75ecfdc%40%3Ccommits.pulsar.apache.org%3E)
15. [[ignite-user] 20201117 Query on CVE-2020-5421](https://lists.apache.org/thread.html/raf7ca57033e537e4f9d7df7f192fa6968c1e49409b2348e08d807ccb%40%3Cuser.ignite.apache.org%3E)
16. [[ignite-user] 20201119 Re: Query on CVE-2020-5421](https://lists.apache.org/thread.html/ra889d95141059c6cbe77dd80249bb488ae53b274b5f3abad09d9511d%40%3Cuser.ignite.apache.org%3E)
17. [[hive-issues] 20210107 [jira] [Resolved] (HIVE-24303) Upgrade spring framework to 4.3.29.RELEASE+ due to CVE-2020-5421](https://lists.apache.org/thread.html/rd462a8b0dfab4c15e67c0672cd3c211ecd0e4f018f824082ed54f665%40%3Cissues.hive.apache.org%3E)
18. [](https://www.oracle.com/security-alerts/cpujan2021.html)
19. [](https://www.oracle.com/security-alerts/cpuApr2021.html)
20. [](https://security.netapp.com/advisory/ntap-20210513-0009/)
21. [](https://www.oracle.com//security-alerts/cpujul2021.html)
22. [](https://www.oracle.com/security-alerts/cpuoct2021.html)
23. [](https://www.oracle.com/security-alerts/cpujan2022.html)
24. [](https://www.oracle.com/security-alerts/cpuapr2022.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-4463, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-4463 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4463
- **State**: PUBLISHED
- **Published Date**: July 08, 2016 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 00:32 UTC
- **Reserved Date**: May 02, 2016 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Stack-based buffer overflow in Apache Xerces-C++ before 3.1.4 allows context-dependent attackers to cause a denial of service via a deeply nested DTD.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html)
2. [](https://issues.apache.org/jira/browse/XERCESC-2069)
3. [](https://issues.apache.org/jira/secure/ReleaseNote.jspa?projectId=10510&version=12336069)
4. [RHSA-2018:3335](https://access.redhat.com/errata/RHSA-2018:3335)
5. [DSA-3610](https://www.debian.org/security/2016/dsa-3610)
6. [1036211](http://www.securitytracker.com/id/1036211)
7. [openSUSE-SU-2016:2232](http://lists.opensuse.org/opensuse-updates/2016-09/msg00013.html)
8. [RHSA-2018:3506](https://access.redhat.com/errata/RHSA-2018:3506)
9. [RHSA-2018:3514](https://access.redhat.com/errata/RHSA-2018:3514)
10. [91501](http://www.securityfocus.com/bid/91501)
11. [](http://xerces.apache.org/xerces-c/secadv/CVE-2016-4463.txt)
12. [20160629 CVE-2016-4463: Apache Xerces-C XML Parser Crashes on Malformed DTD](http://www.securityfocus.com/archive/1/538784/100/0/threaded)
13. [](http://packetstormsecurity.com/files/137714/Apache-Xerces-C-XML-Parser-Crash.html)
14. [openSUSE-SU-2016:1808](http://lists.opensuse.org/opensuse-updates/2016-07/msg00053.html)
15. [](https://www.oracle.com/security-alerts/cpuapr2020.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0541, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0541 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0541
- **State**: PUBLISHED
- **Published Date**: June 22, 2021 at 11:12 UTC
- **Last Updated**: August 03, 2024 at 15:47 UTC
- **Reserved Date**: November 06, 2020 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In phNxpNciHal_ext_process_nfc_init_rsp of phNxpNciHal_ext.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure in the NFC server with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-169258455
### Affected Products
**n/a - Android**
Affected versions:
- Android-11 (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2021-06-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-3850, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-3850 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-3850
- **State**: PUBLISHED
- **Published Date**: April 22, 2025 at 00:00 UTC
- **Last Updated**: April 22, 2025 at 02:06 UTC
- **Reserved Date**: April 21, 2025 at 13:48 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as problematic, has been found in YXJ2018 SpringBoot-Vue-OnlineExam 1.0. This issue affects some unknown processing of the component API. The manipulation leads to improper authentication. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 3.7/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-287: Improper Authentication
### Affected Products
**YXJ2018 - SpringBoot-Vue-OnlineExam**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-305777 | YXJ2018 SpringBoot-Vue-OnlineExam API improper authentication](https://vuldb.com/?id.305777)
2. [VDB-305777 | CTI Indicators (IOB, IOC)](https://vuldb.com/?ctiid.305777)
3. [Submit #556284 | cms OnlineExam 1.0 Unauthorized](https://vuldb.com/?submit.556284)
4. [](https://github.com/YXJ2018/SpringBoot-Vue-OnlineExam/issues/73)
5. [](https://github.com/YXJ2018/SpringBoot-Vue-OnlineExam/issues/75)
### Credits
- moyu666 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-33498, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-33498 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-33498
- **State**: PUBLISHED
- **Published Date**: June 07, 2023 at 00:00 UTC
- **Last Updated**: January 07, 2025 at 15:56 UTC
- **Reserved Date**: May 22, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
alist <=3.16.3 is vulnerable to Incorrect Access Control. Low privilege accounts can upload any file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/YUyuanAN-com/loophole) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-40647, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-40647 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-40647
- **State**: PUBLISHED
- **Published Date**: September 09, 2022 at 17:57 UTC
- **Last Updated**: August 04, 2024 at 02:51 UTC
- **Reserved Date**: September 07, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In man2html 1.6g, a specific string being read in from a file will overwrite the size parameter in the top chunk of the heap. This at least causes the program to segmentation abort if the heap size parameter isn't aligned correctly. In version before GLIBC version 2.29 and aligned correctly, it allows arbitrary write anywhere in the programs memory.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gist.github.com/untaman/cb58123fe89fc65e3984165db5d40933) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-6930, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-6930 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6930
- **State**: PUBLISHED
- **Published Date**: July 24, 2024 at 07:31 UTC
- **Last Updated**: August 01, 2024 at 21:45 UTC
- **Reserved Date**: July 19, 2024 at 21:10 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The WP Booking Calendar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'type' attribute within the plugin's bookingform shortcode in all versions up to, and including, 10.2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**wpdevelop - WP Booking Calendar**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/2aaca776-03ce-43bb-9553-f455f57124a3?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/booking/trunk/core/lib/wpdev-booking-class.php#L849)
3. [](https://wordpress.org/plugins/booking/#developers)
4. [](https://plugins.trac.wordpress.org/changeset/3123628/)
### Credits
- Arkadiusz Hydzik |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-57910, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-57910 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-57910
- **State**: PUBLISHED
- **Published Date**: January 19, 2025 at 11:52 UTC
- **Last Updated**: May 04, 2025 at 13:01 UTC
- **Reserved Date**: January 19, 2025 at 11:50 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
iio: light: vcnl4035: fix information leak in triggered buffer
The 'buffer' local array is used to push data to userspace from a
triggered buffer, but it does not set an initial value for the single
data element, which is an u16 aligned to 8 bytes. That leaves at least
4 bytes uninitialized even after writing an integer value with
regmap_read().
Initialize the array to zero before using it to avoid pushing
uninitialized information to userspace.
### Affected Products
**Linux - Linux**
Affected versions:
- da8ef748fec2d55db0ae424ab40eee0c737564aa (Status: affected)
- 49739675048d372946c1ef136c466d5675eba9f0 (Status: affected)
- ec90b52c07c0403a6db60d752484ec08d605ead0 (Status: affected)
- ec90b52c07c0403a6db60d752484ec08d605ead0 (Status: affected)
- ec90b52c07c0403a6db60d752484ec08d605ead0 (Status: affected)
- ec90b52c07c0403a6db60d752484ec08d605ead0 (Status: affected)
- ec90b52c07c0403a6db60d752484ec08d605ead0 (Status: affected)
- d69f0d132563a63688efb0afb4dfeaa74a217306 (Status: affected)
- 4637815d7922c4bce3bacb13dd1fb5e9a7d167d8 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.14 (Status: affected)
- 0 (Status: unaffected)
- 5.4.290 (Status: unaffected)
- 5.10.234 (Status: unaffected)
- 5.15.177 (Status: unaffected)
- 6.1.125 (Status: unaffected)
- 6.6.72 (Status: unaffected)
- 6.12.10 (Status: unaffected)
- 6.13 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/13e56229fc81051a42731046e200493c4a7c28ff)
2. [](https://git.kernel.org/stable/c/b0e9c11c762e4286732d80e66c08c2cb3157b06b)
3. [](https://git.kernel.org/stable/c/cb488706cdec0d6d13f2895bcdf0c32b283a7cc7)
4. [](https://git.kernel.org/stable/c/47d245be86492974db3aeb048609542167f56518)
5. [](https://git.kernel.org/stable/c/a15ea87d4337479c9446b5d71616f4668337afed)
6. [](https://git.kernel.org/stable/c/f6fb1c59776b4263634c472a5be8204c906ffc2c)
7. [](https://git.kernel.org/stable/c/47b43e53c0a0edf5578d5d12f5fc71c019649279) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-36360, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-36360 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-36360
- **State**: REJECTED
- **Last Updated**: July 09, 2023 at 00:00 UTC
- **Reserved Date**: June 21, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-24407, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-24407 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-24407
- **State**: PUBLISHED
- **Published Date**: November 09, 2020 at 00:39 UTC
- **Last Updated**: September 16, 2024 at 20:16 UTC
- **Reserved Date**: August 19, 2020 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Magento versions 2.4.0 and 2.3.5p1 (and earlier) are affected by an unsafe file upload vulnerability that could result in arbitrary code execution. This vulnerability could be abused by authenticated users with administrative permissions to the System/Data and Transfer/Import components.
### CVSS Metrics
- **CVSS Base Score**: 9.1/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**Adobe - Magento Commerce**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/magento/apsb20-59.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-9166, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-9166 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-9166
- **State**: PUBLISHED
- **Published Date**: December 10, 2014 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 13:33 UTC
- **Reserved Date**: December 01, 2014 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe ColdFusion 10 before Update 15 and 11 before Update 3 allows attackers to cause a denial of service (resource consumption) via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://helpx.adobe.com/security/products/coldfusion/apsb14-29.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-47182, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-47182 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-47182
- **State**: PUBLISHED
- **Published Date**: April 10, 2024 at 18:56 UTC
- **Last Updated**: May 04, 2025 at 07:05 UTC
- **Reserved Date**: March 25, 2024 at 09:12 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
scsi: core: Fix scsi_mode_sense() buffer length handling
Several problems exist with scsi_mode_sense() buffer length handling:
1) The allocation length field of the MODE SENSE(10) command is 16-bits,
occupying bytes 7 and 8 of the CDB. With this command, access to mode
pages larger than 255 bytes is thus possible. However, the CDB
allocation length field is set by assigning len to byte 8 only, thus
truncating buffer length larger than 255.
2) If scsi_mode_sense() is called with len smaller than 8 with
sdev->use_10_for_ms set, or smaller than 4 otherwise, the buffer length
is increased to 8 and 4 respectively, and the buffer is zero filled
with these increased values, thus corrupting the memory following the
buffer.
Fix these 2 problems by using put_unaligned_be16() to set the allocation
length field of MODE SENSE(10) CDB and by returning an error when len is
too small.
Furthermore, if len is larger than 255B, always try MODE SENSE(10) first,
even if the device driver did not set sdev->use_10_for_ms. In case of
invalid opcode error for MODE SENSE(10), access to mode pages larger than
255 bytes are not retried using MODE SENSE(6). To avoid buffer length
overflows for the MODE_SENSE(10) case, check that len is smaller than 65535
bytes.
While at it, also fix the folowing:
* Use get_unaligned_be16() to retrieve the mode data length and block
descriptor length fields of the mode sense reply header instead of using
an open coded calculation.
* Fix the kdoc dbd argument explanation: the DBD bit stands for Disable
Block Descriptor, which is the opposite of what the dbd argument
description was.
### Affected Products
**Linux - Linux**
Affected versions:
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
- 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.15.5 (Status: unaffected)
- 5.16 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/e15de347faf4a9f494cbd4e9a623d343dc1b5851)
2. [](https://git.kernel.org/stable/c/17b49bcbf8351d3dbe57204468ac34f033ed60bc) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-2298, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-2298 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-2298
- **State**: PUBLISHED
- **Published Date**: July 02, 2009 at 10:00 UTC
- **Last Updated**: September 16, 2024 at 16:33 UTC
- **Reserved Date**: July 02, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in rping in HP OpenView Network Node Manager (OV NNM) 7.53 on Linux allows remote attackers to execute arbitrary code via unspecified vectors, possibly involving a CGI request to webappmon.exe. NOTE: this may overlap CVE-2009-1420.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20090626 HP Network Node Manager rping Stack Buffer Overflow Vulnerability](http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=810) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-11671, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-11671 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-11671
- **State**: PUBLISHED
- **Published Date**: June 01, 2018 at 17:00 UTC
- **Last Updated**: August 05, 2024 at 08:17 UTC
- **Reserved Date**: June 01, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in GreenCMS v2.3.0603. There is a CSRF vulnerability that can add an admin account via index.php?m=admin&c=access&a=adduserhandle.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/GreenCMS/GreenCMS/issues/109)
2. [44826](https://www.exploit-db.com/exploits/44826/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-12866, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-12866 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-12866
- **State**: PUBLISHED
- **Published Date**: June 24, 2020 at 12:52 UTC
- **Last Updated**: August 04, 2024 at 12:11 UTC
- **Reserved Date**: May 14, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A NULL pointer dereference in SANE Backends before 1.0.30 allows a malicious device connected to the same local network as the victim to cause a denial of service, GHSL-2020-079.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://alioth-lists.debian.net/pipermail/sane-announce/2020/000041.html)
2. [](https://securitylab.github.com/advisories/GHSL-2020-075-libsane)
3. [USN-4470-1](https://usn.ubuntu.com/4470-1/)
4. [openSUSE-SU-2020:1791](http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html)
5. [openSUSE-SU-2020:1798](http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2400, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2400 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2400
- **State**: PUBLISHED
- **Published Date**: May 22, 2008 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 08:58 UTC
- **Reserved Date**: May 22, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in stunnel before 4.23, when running as a service on Windows, allows local users to gain privileges via unknown attack vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [29285](http://www.securityfocus.com/bid/29285)
2. [ADV-2008-1568](http://www.vupen.com/english/advisories/2008/1568/references)
3. [30297](http://secunia.com/advisories/30297)
4. [[stunnel-announce] 20080503 stunnel 4.23 released](http://stunnel.mirt.net/pipermail/stunnel-announce/2008-May/000034.html)
5. [1020049](http://www.securitytracker.com/id?1020049)
6. [stunnel-windows-privilege-escalation(42526)](https://exchange.xforce.ibmcloud.com/vulnerabilities/42526) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-37311, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-37311 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-37311
- **State**: PUBLISHED
- **Published Date**: August 23, 2024 at 14:26 UTC
- **Last Updated**: August 23, 2024 at 16:12 UTC
- **Reserved Date**: June 05, 2024 at 20:10 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Collabora Online is a collaborative online office suite based on LibreOffice. In affected versions of Collabora Online, https connections from coolwsd to other hosts may incompletely verify the remote host's certificate's against the full chain of trust. This vulnerability is fixed in Collabora Online 24.04.4.3, 23.05.14.1, and 22.05.23.1.
### CVSS Metrics
- **CVSS Base Score**: 8.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N`
### Weakness Classification (CWE)
- CWE-295: Security Weakness
### Affected Products
**CollaboraOnline - online**
Affected versions:
- >= 24.04.1.1, < 24.04.4.3 (Status: affected)
- >= 23.05.0-1, < 23.05.14-1 (Status: affected)
- < 22.05.23.1 (Status: affected)
### References
1. [https://github.com/CollaboraOnline/online/security/advisories/GHSA-hvhm-5c44-977x](https://github.com/CollaboraOnline/online/security/advisories/GHSA-hvhm-5c44-977x) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-4436, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-4436 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4436
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: June 08, 2015 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-0514, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-0514 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-0514
- **State**: PUBLISHED
- **Published Date**: March 21, 2022 at 18:50 UTC
- **Last Updated**: August 02, 2024 at 23:32 UTC
- **Reserved Date**: February 07, 2022 at 00:00 UTC
- **Assigned By**: @huntrdev
### Vulnerability Description
Business Logic Errors in GitHub repository crater-invoice/crater prior to 6.0.5.
### Weakness Classification (CWE)
- CWE-840: Security Weakness
### Affected Products
**crater-invoice - crater-invoice/crater**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.dev/bounties/af08000d-9f4a-4743-865d-5d5cdaf7fb27)
2. [](https://github.com/crater-invoice/crater/commit/fadef0ea07d2f7fb3f41c2cae444ebca2f479679) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-1556, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-1556 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-1556
- **State**: PUBLISHED
- **Published Date**: July 23, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 09:42 UTC
- **Reserved Date**: January 16, 2014 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allow remote attackers to execute arbitrary code via crafted WebGL content constructed with the Cesium JavaScript library.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.mozilla.org/security/announce/2014/mfsa2014-62.html)
2. [59719](http://secunia.com/advisories/59719)
3. [60083](http://secunia.com/advisories/60083)
4. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1028891)
5. [68822](http://www.securityfocus.com/bid/68822)
6. [60621](http://secunia.com/advisories/60621)
7. [GLSA-201504-01](https://security.gentoo.org/glsa/201504-01)
8. [60306](http://secunia.com/advisories/60306)
9. [](http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html)
10. [](http://linux.oracle.com/errata/ELSA-2014-0918.html)
11. [1030620](http://www.securitytracker.com/id/1030620)
12. [DSA-2996](http://www.debian.org/security/2014/dsa-2996)
13. [1030619](http://www.securitytracker.com/id/1030619)
14. [60486](http://secunia.com/advisories/60486)
15. [60628](http://secunia.com/advisories/60628)
16. [DSA-2986](http://www.debian.org/security/2014/dsa-2986)
17. [59760](http://secunia.com/advisories/59760)
18. [59591](http://secunia.com/advisories/59591) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-0671, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-0671 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-0671
- **State**: PUBLISHED
- **Published Date**: October 13, 2000 at 04:00 UTC
- **Last Updated**: August 01, 2024 at 16:48 UTC
- **Reserved Date**: November 25, 1999 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in ToxSoft NextFTP client through CWD command.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [572](http://www.securityfocus.com/bid/572) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-28876, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-28876 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-28876
- **State**: PUBLISHED
- **Published Date**: April 11, 2021 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 21:55 UTC
- **Reserved Date**: March 19, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In the standard library in Rust before 1.52.0, the Zip implementation has a panic safety issue. It calls __iterator_get_unchecked() more than once for the same index when the underlying iterator panics (in certain conditions). This bug could lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/rust-lang/rust/issues/81740)
2. [](https://github.com/rust-lang/rust/pull/81741)
3. [FEDORA-2021-d0ba1901ca](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CZ337CM4GFJLRDFVQCGC7J25V65JXOG5/)
4. [FEDORA-2021-b1ba54add6](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZG65GUW6Z2CYOQHF7T3TB5CZKIX6ZJE/)
5. [FEDORA-2021-d7f74f0250](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TFUO3URYCO73D2Q4WYJBWAMJWGGVXQO4/)
6. [GLSA-202210-09](https://security.gentoo.org/glsa/202210-09) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-5474, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-5474 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-5474
- **State**: PUBLISHED
- **Published Date**: October 11, 2023 at 22:28 UTC
- **Last Updated**: May 01, 2025 at 17:45 UTC
- **Reserved Date**: October 10, 2023 at 00:12 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Heap buffer overflow in PDF in Google Chrome prior to 118.0.5993.70 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium)
### Affected Products
**Google - Chrome**
Affected versions:
- 118.0.5993.70 (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_10.html)
2. [](https://crbug.com/1483194)
3. [](https://www.debian.org/security/2023/dsa-5526)
4. [](https://security.gentoo.org/glsa/202311-11)
5. [](https://security.gentoo.org/glsa/202312-07)
6. [](https://security.gentoo.org/glsa/202401-34) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-19241, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-19241 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-19241
- **State**: PUBLISHED
- **Published Date**: December 20, 2018 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 11:30 UTC
- **Reserved Date**: November 13, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in video.cgi on TRENDnet TV-IP110WN V1.2.2 build 68, V1.2.2.65, and V1.2.2 build 64 and TV-IP121WN V1.2.2 build 28 devices allows attackers to hijack the control flow to any attacker-specified location by crafting a POST request payload (without authentication).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/150693/TRENDnet-Command-Injection-Buffer-Overflow-Cross-Site-Scripting.html)
2. [20181209 Multiple vulnerabilities found in Trendnet routers and IP Cameras.](http://seclists.org/fulldisclosure/2018/Dec/21) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-2847, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-2847 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-2847
- **State**: PUBLISHED
- **Published Date**: July 23, 2010 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 02:46 UTC
- **Reserved Date**: July 23, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple SQL injection vulnerabilities in the InterJoomla ArtForms (com_artforms) component 2.1b7.2 RC2 for Joomla! allow remote attackers to execute arbitrary SQL commands via the viewform parameter in a (1) ferforms or (2) tferforms action to index.php, and the (3) id parameter in a vferforms action to index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [41457](http://www.securityfocus.com/bid/41457)
2. [20100707 ArtForms 2.1b7.2 RC2 Joomla Component Multiple Remote Vulnerabilities](http://www.securityfocus.com/archive/1/512215/100/0/threaded)
3. [14263](http://www.exploit-db.com/exploits/14263)
4. [artforms-index-sql-injection(60160)](https://exchange.xforce.ibmcloud.com/vulnerabilities/60160)
5. [](http://packetstormsecurity.org/1007-exploits/joomlaartforms-sqltraversalxss.txt) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-23861, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-23861 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-23861
- **State**: PUBLISHED
- **Published Date**: March 29, 2023 at 12:50 UTC
- **Last Updated**: January 10, 2025 at 19:14 UTC
- **Reserved Date**: January 19, 2023 at 11:32 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in German Mesky GMAce plugin <= 1.5.2 versions.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**German Mesky - GMAce**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/gmace/wordpress-gmace-plugin-1-5-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- Mika (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-9133, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-9133 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9133
- **State**: PUBLISHED
- **Published Date**: May 21, 2017 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 16:55 UTC
- **Reserved Date**: May 21, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered on Mimosa Client Radios before 2.2.3 and Mimosa Backhaul Radios before 2.2.3. In the device's web interface, after logging in, there is a page that allows you to ping other hosts from the device and view the results. The user is allowed to specify which host to ping, but this variable is not sanitized server-side, which allows an attacker to pass a specially crafted string to execute shell commands as the root user.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://blog.iancaling.com/post/160596244178) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6293, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6293 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6293
- **State**: PUBLISHED
- **Published Date**: October 03, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 12:10 UTC
- **Reserved Date**: September 11, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in the Statistics (ke_stats) extension before 1.1.2 for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, as exploited in the wild in February 2014.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-002/)
2. [](http://typo3.org/extensions/repository/view/ke_stats) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-21794, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-21794 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-21794
- **State**: PUBLISHED
- **Published Date**: February 27, 2025 at 02:18 UTC
- **Last Updated**: May 04, 2025 at 07:21 UTC
- **Reserved Date**: December 29, 2024 at 08:45 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
HID: hid-thrustmaster: fix stack-out-of-bounds read in usb_check_int_endpoints()
Syzbot[1] has detected a stack-out-of-bounds read of the ep_addr array from
hid-thrustmaster driver. This array is passed to usb_check_int_endpoints
function from usb.c core driver, which executes a for loop that iterates
over the elements of the passed array. Not finding a null element at the end of
the array, it tries to read the next, non-existent element, crashing the kernel.
To fix this, a 0 element was added at the end of the array to break the for
loop.
[1] https://syzkaller.appspot.com/bug?extid=9c9179ac46169c56c1ad
### Affected Products
**Linux - Linux**
Affected versions:
- 220883fba32549a34f0734e4859d07f4dcd56992 (Status: affected)
- ae730deded66150204c494282969bfa98dc3ae67 (Status: affected)
- e5bcae4212a6a4b4204f46a1b8bcba08909d2007 (Status: affected)
- 816e84602900f7f951458d743fa12769635ebfd5 (Status: affected)
- 50420d7c79c37a3efe4010ff9b1bb14bc61ebccf (Status: affected)
**Linux - Linux**
Affected versions:
- 6.6.76 (Status: affected)
- 6.12.13 (Status: affected)
- 6.13.2 (Status: affected)
### References
1. [](https://git.kernel.org/stable/c/436f48c864186e9413d1b7c6e91767cc9e1a65b8)
2. [](https://git.kernel.org/stable/c/f3ce05283f6cb6e19c220f5382def43dc5bd56b9)
3. [](https://git.kernel.org/stable/c/cdd9a1ea23ff1a272547217100663e8de4eada40)
4. [](https://git.kernel.org/stable/c/73e36a699b9f46322ffb81f072a24e64f728dba7)
5. [](https://git.kernel.org/stable/c/0b43d98ff29be3144e86294486b1373b5df74c0e) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-2529, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-2529 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2529
- **State**: PUBLISHED
- **Published Date**: September 30, 2022 at 10:45 UTC
- **Last Updated**: May 20, 2025 at 16:03 UTC
- **Reserved Date**: July 25, 2022 at 00:00 UTC
- **Assigned By**: cloudflare
### Vulnerability Description
sflow decode package does not employ sufficient packet sanitisation which can lead to a denial of service attack. Attackers can craft malformed packets causing the process to consume large amounts of memory resulting in a denial of service.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
- CWE-400: Security Weakness
### Affected Products
**Cloudflare - goflow**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://github.com/cloudflare/goflow/security/advisories/GHSA-9rpw-2h95-666c)
### Credits
- Justin Timperio, Chase Hiltz |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-16063, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-16063 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16063
- **State**: PUBLISHED
- **Published Date**: June 07, 2018 at 02:00 UTC
- **Last Updated**: September 16, 2024 at 17:53 UTC
- **Reserved Date**: October 29, 2017 at 00:00 UTC
- **Assigned By**: hackerone
### Vulnerability Description
node-opensl was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.
### Weakness Classification (CWE)
- CWE-506: Security Weakness
### Affected Products
**HackerOne - node-opensl node module**
Affected versions:
- All versions (Status: affected)
### References
1. [](https://nodesecurity.io/advisories/502) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-43260, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-43260 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-43260
- **State**: PUBLISHED
- **Published Date**: October 05, 2023 at 00:00 UTC
- **Last Updated**: September 19, 2024 at 18:55 UTC
- **Reserved Date**: September 18, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Milesight UR5X, UR32L, UR32, UR35, UR41 before v35.3.0.7 was discovered to contain a cross-site scripting (XSS) vulnerability via the admin panel.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gist.github.com/win3zz/c7eda501edcf5383df32fabe00938d13) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-47542, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-47542 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-47542
- **State**: PUBLISHED
- **Published Date**: May 07, 2025 at 14:20 UTC
- **Last Updated**: May 07, 2025 at 18:17 UTC
- **Reserved Date**: May 07, 2025 at 09:39 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Michael Simple calendar for Elementor allows Cross Site Request Forgery. This issue affects Simple calendar for Elementor: from n/a through 1.6.5.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Michael - Simple calendar for Elementor**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/simple-calendar-for-elementor/vulnerability/wordpress-simple-calendar-for-elementor-1-6-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve)
### Credits
- haudayroi - BlueRock (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-20886, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-20886 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-20886
- **State**: PUBLISHED
- **Published Date**: February 04, 2025 at 07:19 UTC
- **Last Updated**: March 25, 2025 at 05:36 UTC
- **Reserved Date**: November 06, 2024 at 02:30 UTC
- **Assigned By**: SamsungMobile
### Vulnerability Description
Inclusion of sensitive information in test code in softsim trustlet prior to SMR Jan-2025 Release 1 allows local privileged attackers to get test key.
### CVSS Metrics
- **CVSS Base Score**: 4.1/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N`
### Affected Products
**Samsung Mobile - Samsung Mobile Devices**
Affected versions:
- SMR Jan-2025 Release in Select Android 12, 13, 14 devices (Status: unaffected)
### References
1. [](https://security.samsungmobile.com/securityUpdate.smsb?year=2025&month=01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-4090, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-4090 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-4090
- **State**: PUBLISHED
- **Published Date**: October 29, 2010 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 03:34 UTC
- **Reserved Date**: October 25, 2010 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1024664](http://www.securitytracker.com/id?1024664)
2. [](http://www.adobe.com/support/security/bulletins/apsb10-25.html)
3. [oval:org.mitre.oval:def:12199](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12199) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-34855, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-34855 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-34855
- **State**: PUBLISHED
- **Published Date**: October 25, 2021 at 17:10 UTC
- **Last Updated**: August 04, 2024 at 00:26 UTC
- **Reserved Date**: June 17, 2021 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows local attackers to disclose sensitive information on affected installations of Parallels Desktop 16.1.3 (49160). An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the Toolgate component. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-13592.
### Weakness Classification (CWE)
- CWE-908: Security Weakness
### Affected Products
**Parallels - Desktop**
Affected versions:
- 16.1.3 (49160) (Status: affected)
### References
1. [](https://kb.parallels.com/125013)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-21-939/)
### Credits
- Jack Dates of RET2 Systems, Inc. (@ret2systems) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-4608, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-4608 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-4608
- **State**: PUBLISHED
- **Published Date**: January 27, 2012 at 15:00 UTC
- **Last Updated**: August 07, 2024 at 00:09 UTC
- **Reserved Date**: November 29, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
mod_cluster in JBoss Enterprise Application Platform 5.1.2 for Red Hat Linux allows worker nodes to register with arbitrary virtual hosts, which allows remote attackers to bypass intended access restrictions and provide malicious content, hijack sessions, and steal credentials by registering from an external vhost that does not enforce security constraints.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2012:0039](http://www.redhat.com/support/errata/RHSA-2012-0039.html)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=767020)
3. [RHSA-2012:0035](http://www.redhat.com/support/errata/RHSA-2012-0035.html)
4. [51554](http://www.securityfocus.com/bid/51554)
5. [jboss-modcluster-security-bypass(72460)](https://exchange.xforce.ibmcloud.com/vulnerabilities/72460)
6. [RHSA-2012:0040](http://www.redhat.com/support/errata/RHSA-2012-0040.html)
7. [RHSA-2012:0037](http://www.redhat.com/support/errata/RHSA-2012-0037.html)
8. [RHSA-2012:0036](http://www.redhat.com/support/errata/RHSA-2012-0036.html)
9. [1026545](http://www.securitytracker.com/id?1026545)
10. [RHSA-2012:0038](http://www.redhat.com/support/errata/RHSA-2012-0038.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-1768, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-1768 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1768
- **State**: PUBLISHED
- **Published Date**: August 20, 2010 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 01:35 UTC
- **Reserved Date**: May 06, 2010 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
Unspecified vulnerability in Apple iTunes before 9.1 allows local users to gain console privileges via vectors related to log files, "insecure file operation," and syncing an iPhone, iPad, or iPod touch.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [itunes-operations-privilege-escalation(61222)](https://exchange.xforce.ibmcloud.com/vulnerabilities/61222)
2. [](http://support.apple.com/kb/HT4105)
3. [oval:org.mitre.oval:def:7604](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7604)
4. [42538](http://www.securityfocus.com/bid/42538) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-1365, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-1365 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-1365
- **State**: PUBLISHED
- **Published Date**: May 16, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 21:44 UTC
- **Reserved Date**: May 02, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Pico Server (pServ) 3.2 and earlier allows remote attackers to execute arbitrary commands via a URL with multiple leading "/" (slash) characters and ".." sequences.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20050516 Advisory: Pico Server (pServ) Remote Command Injection](http://marc.info/?l=full-disclosure&m=111625635716712&w=2)
2. [](http://www.redteam-pentesting.de/advisories/rt-sa-2005-010.txt)
3. [13642](http://www.securityfocus.com/bid/13642)
4. [](http://sourceforge.net/project/shownotes.php?release_id=327708) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-3755, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-3755 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-3755
- **State**: PUBLISHED
- **Published Date**: October 05, 2010 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 03:18 UTC
- **Reserved Date**: October 05, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The _DAS_ReadBlockReply function in FastBackServer.exe in the Server in IBM Tivoli Storage Manager (TSM) FastBack 5.5.0.0 through 5.5.6.0 and 6.1.0.0 through 6.1.0.1 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via data in a TCP packet. NOTE: this might overlap CVE-2010-3060.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://zerodayinitiative.com/advisories/ZDI-10-187/)
2. [20100929 ZDI-10-187: IBM TSM FastBack Server _DAS_ReadBlockReply Remote Denial of Service Vulnerability](http://www.securityfocus.com/archive/1/514063/100/0/threaded)
3. [](http://www.ibm.com/support/docview.wss?uid=swg21443820)
4. [IC69883](http://www-01.ibm.com/support/docview.wss?uid=swg1IC69883) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3358, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3358 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3358
- **State**: PUBLISHED
- **Published Date**: December 14, 2005 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 23:10 UTC
- **Reserved Date**: October 27, 2005 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Linux kernel before 2.6.15 allows local users to cause a denial of service (panic) via a set_mempolicy call with a 0 bitmask, which causes a panic when a page fault occurs.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1015433](http://securitytracker.com/id?1015433)
2. [oval:org.mitre.oval:def:10410](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10410)
3. [](http://linux.bkbits.net:8080/linux-2.6/cset%4042307e9fp8ihEMrfaoPMp_agDevQNA)
4. [18788](http://secunia.com/advisories/18788)
5. [19038](http://secunia.com/advisories/19038)
6. [RHSA-2006:0101](http://www.redhat.com/support/errata/RHSA-2006-0101.html)
7. [](http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15)
8. [SUSE-SA:2006:006](http://www.novell.com/linux/security/advisories/2006_06_kernel.html)
9. [FLSA:157459-4](http://www.securityfocus.com/archive/1/427981/100/0/threaded)
10. [18510](http://secunia.com/advisories/18510)
11. [ADV-2006-0035](http://www.vupen.com/english/advisories/2006/0035)
12. [SUSE-SA:2006:012](http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html)
13. [16135](http://www.securityfocus.com/bid/16135)
14. [18216](http://secunia.com/advisories/18216)
15. [FLSA:157459-3](http://www.securityfocus.com/archive/1/427980/100/0/threaded)
16. [DSA-1017](http://www.debian.org/security/2006/dsa-1017)
17. [](https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=175683)
18. [19374](http://secunia.com/advisories/19374) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-29764, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-29764 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-29764
- **State**: PUBLISHED
- **Published Date**: October 06, 2021 at 17:10 UTC
- **Last Updated**: September 16, 2024 at 16:24 UTC
- **Reserved Date**: March 31, 2021 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Sterling B2B Integrator 5.2.0.0 through 6.1.1.0 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 202268.
### Affected Products
**IBM - Sterling B2B Integrator**
Affected versions:
- 5.2.0.0 (Status: affected)
- 6.1.0.0 (Status: affected)
- 6.0.3.4 (Status: affected)
- 6.1.0.3 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6495967)
2. [ibm-sterling-cve202129764-xss (202268)](https://exchange.xforce.ibmcloud.com/vulnerabilities/202268)
3. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/202268) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-46533, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-46533 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-46533
- **State**: PUBLISHED
- **Published Date**: December 20, 2022 at 00:00 UTC
- **Last Updated**: April 16, 2025 at 17:46 UTC
- **Reserved Date**: December 05, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Tenda F1203 V2.0.1.6 was discovered to contain a buffer overflow via the limitSpeed parameter at /goform/SetClientState.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Double-q1015/CVE-vulns/blob/main/tenda_f1203/formSetClientState_limitSpeed/formSetClientState_limitSpeed.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-22773, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-22773 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-22773
- **State**: PUBLISHED
- **Published Date**: February 28, 2023 at 16:56 UTC
- **Last Updated**: March 07, 2025 at 20:45 UTC
- **Reserved Date**: January 06, 2023 at 15:24 UTC
- **Assigned By**: hpe
### Vulnerability Description
Authenticated path traversal vulnerabilities exist in the ArubaOS command line interface. Successful exploitation of these vulnerabilities result in the ability to delete arbitrary files in the underlying operating system.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**Hewlett Packard Enterprise (HPE) - Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central**
Affected versions:
- ArubaOS 8.6.x.x: 8.6.0.19 and below (Status: affected)
- ArubaOS 8.10.x.x: 8.10.0.4 and below (Status: affected)
- ArubaOS 10.3.x.x: 10.3.1.0 and below (Status: affected)
- SD-WAN 8.7.0.0-2.3.0.x: 8.7.0.0-2.3.0.8 and below (Status: affected)
### References
1. [](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-002.txt)
### Credits
- Erik de Jong (bugcrowd.com/erikdejong) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-16670, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-16670 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-16670
- **State**: PUBLISHED
- **Published Date**: December 06, 2019 at 17:05 UTC
- **Last Updated**: August 05, 2024 at 01:17 UTC
- **Reserved Date**: September 21, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. The Authentication mechanism has no brute-force prevention.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://cert.vde.com/en-us/advisories)
2. [](https://cert.vde.com/en-us/advisories/vde-2019-018)
3. [](https://mdcop.weidmueller.com/mediadelivery/asset/900_102694)
4. [](https://www.us-cert.gov/ics/advisories/icsa-19-339-02) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-5299, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-5299 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5299
- **State**: PUBLISHED
- **Published Date**: August 13, 2019 at 20:34 UTC
- **Last Updated**: August 04, 2024 at 19:54 UTC
- **Reserved Date**: January 04, 2019 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
Huawei mobile phones Hima-AL00Bhave with Versions earlier than HMA-AL00C00B175 have a signature verification bypass vulnerability. Attackers can induce users to install malicious applications. Due to a defect in the signature verification logic, the malicious applications can invoke specific interface to execute malicious code. A successful exploit may result in the execution of arbitrary code.
### Affected Products
**Huawei - Hima-AL00B**
Affected versions:
- Versions earlier than HMA-AL00C00B175 (Status: affected)
### References
1. [](https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190320-01-phone-en) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-54150, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-54150 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-54150
- **State**: PUBLISHED
- **Published Date**: December 19, 2024 at 18:22 UTC
- **Last Updated**: December 20, 2024 at 17:34 UTC
- **Reserved Date**: November 29, 2024 at 18:02 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
cjwt is a C JSON Web Token (JWT) Implementation. Algorithm confusion occurs when a system improperly verifies the type of signature used, allowing attackers to exploit the lack of distinction between signing methods. If the system doesn't differentiate between an HMAC signed token and an RS/EC/PS signed token during verification, it becomes vulnerable to this kind of attack. For instance, an attacker could craft a token with the alg field set to "HS256" while the server expects an asymmetric algorithm like "RS256". The server might mistakenly use the wrong verification method, such as using a public key as the HMAC secret, leading to unauthorised access. For RSA, the key can be computed from a few signatures. For Elliptic Curve (EC), two potential keys can be recovered from one signature. This can be used to bypass the signature mechanism if an application relies on asymmetrically signed tokens. This issue has been addressed in version 2.3.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
### Weakness Classification (CWE)
- CWE-347: Security Weakness
### Affected Products
**xmidt-org - cjwt**
Affected versions:
- < 2.3.0 (Status: affected)
### References
1. [https://github.com/xmidt-org/cjwt/security/advisories/GHSA-9h24-7qp5-gp82](https://github.com/xmidt-org/cjwt/security/advisories/GHSA-9h24-7qp5-gp82)
2. [https://github.com/xmidt-org/cjwt/commit/096ab3e37f73c914b716e7259589179f363265fd](https://github.com/xmidt-org/cjwt/commit/096ab3e37f73c914b716e7259589179f363265fd) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-0688, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-0688 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0688
- **State**: PUBLISHED
- **Published Date**: January 25, 2024 at 01:55 UTC
- **Last Updated**: August 01, 2024 at 18:11 UTC
- **Reserved Date**: January 18, 2024 at 15:32 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The "WebSub (FKA. PubSubHubbub)" plugin for WordPress is vulnerable to Stored Cross-Site Scripting via plugin settings in all versions up to, and including, 3.1.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 4.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N`
### Affected Products
**joshfraz - WebSub (FKA. PubSubHubbub)**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/f07b166b-3436-4797-a2df-096ff7c27a09?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3024228%40pubsubhubbub&new=3024228%40pubsubhubbub&sfp_email=&sfph_mail=)
### Credits
- Sh |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-29460, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-29460 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-29460
- **State**: PUBLISHED
- **Published Date**: April 10, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 01:10 UTC
- **Reserved Date**: March 19, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in PX4 Autopilot v.1.14.0 allows an attacker to manipulate the flight path allowing for crashes of the drone via the home point location of the mission_block.cpp component.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Drone-Lab/PX4-Autopilot/blob/report-can%27t-finish-mission/report-can%27t-finish-mission.md) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.