System
stringclasses 1
value | User
stringlengths 139
142
| Assistant
stringlengths 279
328k
|
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2007-0337, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2007-0337 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-0337
- **State**: PUBLISHED
- **Published Date**: January 18, 2007 at 02:00 UTC
- **Last Updated**: August 07, 2024 at 12:12 UTC
- **Reserved Date**: January 17, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in sesskglogadmin.php in KGB 1.9 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the skinnn parameter, as demonstrated by invoking kg.php with a postek parameter containing PHP code, which is injected into a file in the kg directory, and then included by sesskglogadmin.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [ADV-2007-0228](http://www.vupen.com/english/advisories/2007/0228)
2. [31585](http://osvdb.org/31585)
3. [kgb-sesskglogadmin-file-include(31508)](https://exchange.xforce.ibmcloud.com/vulnerabilities/31508)
4. [3134](https://www.exploit-db.com/exploits/3134)
5. [23768](http://secunia.com/advisories/23768)
6. [22065](http://www.securityfocus.com/bid/22065)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-1209, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-1209 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1209
- **State**: REJECTED
- **Published Date**: March 22, 2018 at 18:00 UTC
- **Last Updated**: March 22, 2018 at 16:57 UTC
- **Reserved Date**: December 06, 2017 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-36525, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-36525 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-36525
- **State**: PUBLISHED
- **Published Date**: May 07, 2025 at 22:04 UTC
- **Last Updated**: May 08, 2025 at 13:05 UTC
- **Reserved Date**: April 23, 2025 at 22:28 UTC
- **Assigned By**: f5
### Vulnerability Description
When a BIG-IP APM virtual server is configured to use a PingAccess profile, undisclosed requests can cause TMM to terminate.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
### Affected Products
**F5 - BIG-IP**
Affected versions:
- 17.5.0 (Status: unaffected)
- 17.1.0 (Status: affected)
- 16.1.0 (Status: affected)
- 15.1.0 (Status: affected)
### References
1. [](https://my.f5.com/manage/s/article/K000150598)
### Credits
- F5
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-3745, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-3745 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-3745
- **State**: PUBLISHED
- **Published Date**: May 18, 2024 at 12:34 UTC
- **Last Updated**: August 01, 2024 at 20:20 UTC
- **Reserved Date**: April 12, 2024 at 19:57 UTC
- **Assigned By**: Fluid Attacks
### Vulnerability Description
MSI Afterburner v4.6.6.16381 Beta 3 is vulnerable to an ACL Bypass vulnerability in the RTCore64.sys driver, which leads to triggering vulnerabilities like CVE-2024-1443 and CVE-2024-1460 from a low privileged user.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-863: Incorrect Authorization
### Affected Products
**MSI - MSI Afterburner**
Affected versions:
- 4.6.6.16381 Beta 3 (Status: affected)
### References
1. [](https://fluidattacks.com/advisories/gershwin/)
2. [](https://forums.guru3d.com/threads/msi-ab-rtss-development-news-thread.412822/page-227#post-6231456)
3. [](https://forums.guru3d.com/threads/msi-ab-rtss-development-news-thread.412822/page-227#post-6231768)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-51729, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-51729 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-51729
- **State**: PUBLISHED
- **Published Date**: January 17, 2024 at 07:04 UTC
- **Last Updated**: August 02, 2024 at 22:40 UTC
- **Reserved Date**: December 22, 2023 at 09:53 UTC
- **Assigned By**: CERT-In
### Vulnerability Description
This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the DDNS Username parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system.
Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.
### CVSS Metrics
- **CVSS Base Score**: 6.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Hathway - Skyworth Router CM5100**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013)
### Credits
- This vulnerability is reported by Sushant Mane, Parul Sindhwad, Tushar Nagrare and Dr. Faruk Kazi from CoE-CNDS Lab, VJTI Mumbai, India.
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-45832, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-45832 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-45832
- **State**: PUBLISHED
- **Published Date**: January 05, 2022 at 20:32 UTC
- **Last Updated**: August 04, 2024 at 04:54 UTC
- **Reserved Date**: December 27, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A Stack-based Buffer Overflow Vulnerability exists in HDF5 1.13.1-1 at at hdf5/src/H5Eint.c, which causes a Denial of Service (context-dependent).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/HDFGroup/hdf5/issues/1315)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2012-2707, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2012-2707 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-2707
- **State**: PUBLISHED
- **Published Date**: June 27, 2012 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 19:42 UTC
- **Reserved Date**: May 14, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The Hostmaster (Aegir) module 6.x-1.x before 6.x-1.9 for Drupal does not properly exit when users do not have access to package/task nodes, which allows remote attackers to bypass intended access restrictions and edit unauthorized nodes.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [hostmaster-node-security-bypass(75715)](https://exchange.xforce.ibmcloud.com/vulnerabilities/75715)
2. [](http://drupal.org/node/1585678)
3. [](http://drupal.org/node/1585658)
4. [[oss-security] 20120613 Re: CVE Request for Drupal contributed modules](http://www.openwall.com/lists/oss-security/2012/06/14/3)
5. [](http://community.aegirproject.org/1.9)
6. [](http://drupalcode.org/project/hostmaster.git/commitdiff/8a61101)
7. [53588](http://www.securityfocus.com/bid/53588)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-3234, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-3234 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-3234
- **State**: PUBLISHED
- **Published Date**: October 17, 2018 at 01:00 UTC
- **Last Updated**: October 02, 2024 at 19:33 UTC
- **Reserved Date**: December 15, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected are 8.5.3 and 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Outside In Technology and unauthorized read access to a subset of Oracle Outside In Technology accessible data. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.1 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H).
### Affected Products
**Oracle Corporation - Outside In Technology**
Affected versions:
- 8.5.3 (Status: affected)
- 8.5.4 (Status: affected)
### References
1. [105603](http://www.securityfocus.com/bid/105603)
2. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-10045, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-10045 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-10045
- **State**: PUBLISHED
- **Published Date**: May 31, 2019 at 21:09 UTC
- **Last Updated**: August 04, 2024 at 22:10 UTC
- **Reserved Date**: March 25, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The "action" get_sess_id in the web application of Pydio through 8.2.2 discloses the session cookie value in the response body, enabling scripts to get access to its value. This identifier can be reused by an attacker to impersonate a user and perform actions on behalf of him/her (if the session is still active).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.secureauth.com/labs/advisories)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2006-2592, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2006-2592 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-2592
- **State**: PUBLISHED
- **Published Date**: May 25, 2006 at 10:00 UTC
- **Last Updated**: August 07, 2024 at 17:58 UTC
- **Reserved Date**: May 25, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in DSChat 1.0 allows remote attackers to execute arbitrary PHP code via the Nickname field, which is not sanitized before creating a file in a user directory. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20258](http://secunia.com/advisories/20258)
2. [dschat-nickname-file-include(26642)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26642)
3. [ADV-2006-1961](http://www.vupen.com/english/advisories/2006/1961)
4. [25735](http://www.osvdb.org/25735)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-52765, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-52765 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-52765
- **State**: PUBLISHED
- **Published Date**: November 20, 2024 at 00:00 UTC
- **Last Updated**: March 13, 2025 at 13:30 UTC
- **Reserved Date**: November 15, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
H3C GR-1800AX MiniGRW1B0V100R007 is vulnerable to remote code execution (RCE) via the aspForm parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://tjr181.com/2024/11/08/H3C%20GR-1800AX/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-35569, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-35569 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-35569
- **State**: PUBLISHED
- **Published Date**: July 20, 2022 at 17:45 UTC
- **Last Updated**: August 03, 2024 at 09:36 UTC
- **Reserved Date**: July 11, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Blogifier v3.0 was discovered to contain an arbitrary file upload vulnerability at /api/storage/upload/PostImage. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/blogifierdotnet/Blogifier/issues/316)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2002-1883, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2002-1883 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-1883
- **State**: PUBLISHED
- **Published Date**: June 28, 2005 at 04:00 UTC
- **Last Updated**: September 17, 2024 at 02:05 UTC
- **Reserved Date**: June 28, 2005 at 04:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Trolltech Qt Assistant 1.0 in Trolltech Qt 3.0.3, when loaded from the Designer, opens port 7358 for interprocess communication, which allows remote attackers to open arbitrary HTML pages and cause a denial of service.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[Qt-interest] 20020915 assistant leaves port unfiltered](http://lists.trolltech.com/qt-interest/2002-09/thread00549-0.html)
2. [5833](http://www.securityfocus.com/bid/5833)
3. [20020929 QT Assistant leaves port unfiltered](http://online.securityfocus.com/archive/1/293556)
4. [qt-assistant-default-port(10227)](http://www.iss.net/security_center/static/10227.php)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-16839, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-16839 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-16839
- **State**: PUBLISHED
- **Published Date**: October 31, 2018 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 10:32 UTC
- **Reserved Date**: September 11, 2018 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Curl versions 7.33.0 through 7.61.1 are vulnerable to a buffer overrun in the SASL authentication code that may lead to denial of service.
### Weakness Classification (CWE)
- CWE-190: Security Weakness
- CWE-122: Heap-based Buffer Overflow
### Affected Products
**The Curl Project - curl:**
Affected versions:
- from 7.33.0 to 7.61.1 (Status: affected)
### References
1. [GLSA-201903-03](https://security.gentoo.org/glsa/201903-03)
2. [DSA-4331](https://www.debian.org/security/2018/dsa-4331)
3. [[debian-lts-announce] 20181106 [SECURITY] [DLA 1568-1] curl security update](https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html)
4. [](https://curl.haxx.se/docs/CVE-2018-16839.html)
5. [](https://github.com/curl/curl/commit/f3a24d7916b9173c69a3e0ee790102993833d6c5)
6. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16839)
7. [1042012](http://www.securitytracker.com/id/1042012)
8. [USN-3805-1](https://usn.ubuntu.com/3805-1/)
9. [[infra-devnull] 20190404 [GitHub] [incubator-openwhisk-runtime-ballerina] falkzoll commented on issue #15: Update to new base image jdk8u202-b08_openj9-0.12.1.](https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-30932, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-30932 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-30932
- **State**: PUBLISHED
- **Published Date**: August 24, 2021 at 18:50 UTC
- **Last Updated**: August 03, 2024 at 22:48 UTC
- **Reserved Date**: April 13, 2021 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
The issue was addressed with improved permissions logic. This issue is fixed in iOS 15.2 and iPadOS 15.2. A person with physical access to an iOS device may be able to access contacts from the lock screen.
### Affected Products
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT212976)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-10192, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-10192 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-10192
- **State**: PUBLISHED
- **Published Date**: February 09, 2017 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 03:14 UTC
- **Reserved Date**: February 01, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Heap-based buffer overflow in ffserver.c in FFmpeg before 2.8.10, 3.0.x before 3.0.5, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 allows remote attackers to execute arbitrary code by leveraging failure to check chunk size.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [95991](http://www.securityfocus.com/bid/95991)
2. [](https://github.com/FFmpeg/FFmpeg/commit/a5d25faa3f4b18dac737fdb35d0dd68eb0dc2156)
3. [[oss-security] 20170201 CVE Request: ffmpeg remote exploitaion results code execution](http://www.openwall.com/lists/oss-security/2017/01/31/12)
4. [[oss-security] 20170202 Re: CVE Request: ffmpeg remote exploitaion results code execution](http://www.openwall.com/lists/oss-security/2017/02/02/1)
5. [](https://ffmpeg.org/security.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2011-5097, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2011-5097 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-5097
- **State**: PUBLISHED
- **Published Date**: August 08, 2012 at 10:00 UTC
- **Last Updated**: September 16, 2024 at 23:36 UTC
- **Reserved Date**: August 08, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
chef-server-api/app/controllers/cookbooks.rb in Chef Server in Chef before 0.9.18, and 0.10.x before 0.10.2, does not require administrative privileges for the update and destroy methods, which allows remote authenticated users to (1) upload cookbooks via a knife cookbook upload command or (2) delete cookbooks via a knife cookbook delete command.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/opscode/chef/commit/a4ea6edab2fecb922f999cffb0daa04eeeec7a26)
2. [](http://tickets.opscode.com/browse/CHEF-2436)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-45391, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-45391 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-45391
- **State**: PUBLISHED
- **Published Date**: November 15, 2022 at 00:00 UTC
- **Last Updated**: April 30, 2025 at 17:16 UTC
- **Reserved Date**: November 14, 2022 at 00:00 UTC
- **Assigned By**: jenkins
### Vulnerability Description
Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.143 and earlier globally and unconditionally disables SSL/TLS certificate and hostname validation for the entire Jenkins controller JVM.
### Affected Products
**Jenkins project - Jenkins NS-ND Integration Performance Publisher Plugin**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2910%20%281%29)
2. [[oss-security] 20221115 Multiple vulnerabilities in Jenkins plugins](http://www.openwall.com/lists/oss-security/2022/11/15/4)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-40469, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-40469 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-40469
- **State**: PUBLISHED
- **Published Date**: October 12, 2022 at 00:00 UTC
- **Last Updated**: May 15, 2025 at 15:04 UTC
- **Reserved Date**: September 11, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
iKuai OS v3.6.7 was discovered to contain an authenticated remote code execution (RCE) vulnerability.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.ikuai8.com/component/download)
2. [](https://www.ikuai8.com/download.php?n=/3.x/iso/iKuai8_x64_3.6.7_Build202208301257.iso)
3. [](https://github.com/yikesoftware/exp_and_poc_archive/tree/main/CVE/CVE-2022-40469)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-18475, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-18475 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-18475
- **State**: REJECTED
- **Published Date**: October 28, 2019 at 14:42 UTC
- **Last Updated**: October 28, 2019 at 14:42 UTC
- **Reserved Date**: October 28, 2019 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2004-0362, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2004-0362 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-0362
- **State**: PUBLISHED
- **Published Date**: March 23, 2004 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 00:17 UTC
- **Reserved Date**: March 18, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple stack-based buffer overflows in the ICQ parsing routines of the ISS Protocol Analysis Module (PAM) component, as used in various RealSecure, Proventia, and BlackICE products, allow remote attackers to execute arbitrary code via a SRV_MULTI response containing a SRV_USER_ONLINE response packet and a SRV_META_USER response packet with long (1) nickname, (2) firstname, (3) lastname, or (4) email address fields, as exploited by the Witty worm.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20040318 Vulnerability in ICQ Parsing in ISS Products](http://xforce.iss.net/xforce/alerts/id/166)
2. [9913](http://www.securityfocus.com/bid/9913)
3. [11073](http://secunia.com/advisories/11073)
4. [O-104](http://www.ciac.org/ciac/bulletins/o-104.shtml)
5. [AD20040318](http://www.eeye.com/html/Research/Advisories/AD20040318.html)
6. [pam-icq-parsing-bo(15442)](https://exchange.xforce.ibmcloud.com/vulnerabilities/15442)
7. [4355](http://www.osvdb.org/4355)
8. [VU#947254](http://www.kb.cert.org/vuls/id/947254)
9. [20040318 EEYE: Internet Security Systems PAM ICQ Server Response Processing Vulnerability](http://marc.info/?l=bugtraq&m=107965651712378&w=2)
10. [witty-worm-propagation(15543)](https://exchange.xforce.ibmcloud.com/vulnerabilities/15543)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-27665, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-27665 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-27665
- **State**: PUBLISHED
- **Published Date**: April 09, 2024 at 00:00 UTC
- **Last Updated**: November 21, 2024 at 16:07 UTC
- **Reserved Date**: February 26, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unifiedtransform v2.X is vulnerable to Stored Cross-Site Scripting (XSS) via file upload feature in Syllabus module.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/Thirukrishnan/CVE-2024-27665/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-25990, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-25990 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-25990
- **State**: PUBLISHED
- **Published Date**: May 05, 2022 at 16:22 UTC
- **Last Updated**: September 17, 2024 at 00:46 UTC
- **Reserved Date**: April 19, 2022 at 00:00 UTC
- **Assigned By**: f5
### Vulnerability Description
On 1.0.x versions prior to 1.0.1, systems running F5OS-A software may expose certain registry ports externally. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-200: Improper Input Validation
### Affected Products
**F5 - F5OS-A**
Affected versions:
- 1.0.x (Status: affected)
### References
1. [](https://support.f5.com/csp/article/K44233515)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-39918, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-39918 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-39918
- **State**: PUBLISHED
- **Published Date**: September 04, 2023 at 10:05 UTC
- **Last Updated**: September 24, 2024 at 18:52 UTC
- **Reserved Date**: August 07, 2023 at 12:46 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in SAASPROJECT Booking Package Booking Package plugin <= 1.6.01 versions.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**SAASPROJECT Booking Package - Booking Package**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/booking-package/wordpress-booking-package-plugin-1-6-01-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Truoc Phan (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-42454, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-42454 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-42454
- **State**: PUBLISHED
- **Published Date**: December 19, 2022 at 21:10 UTC
- **Last Updated**: April 16, 2025 at 18:24 UTC
- **Reserved Date**: October 06, 2022 at 16:01 UTC
- **Assigned By**: HCL
### Vulnerability Description
Insights for Vulnerability Remediation (IVR) is vulnerable to man-in-the-middle attacks that may lead to information disclosure. This requires privileged network access.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Affected Products
**HCL Software - BigFix Insights for Vulnerability Remediation**
Affected versions:
- <= v2.0 (Status: affected)
### References
1. [](https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0102168)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2011-2752, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2011-2752 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-2752
- **State**: PUBLISHED
- **Published Date**: July 17, 2011 at 20:00 UTC
- **Last Updated**: August 06, 2024 at 23:08 UTC
- **Reserved Date**: July 17, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
CRLF injection vulnerability in SquirrelMail 1.4.21 and earlier allows remote attackers to modify or add preference values via a \n (newline) character, a different vulnerability than CVE-2010-4555.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [DSA-2291](http://www.debian.org/security/2011/dsa-2291)
2. [squirrelmail-newline-crlf-injection(68587)](https://exchange.xforce.ibmcloud.com/vulnerabilities/68587)
3. [MDVSA-2011:123](http://www.mandriva.com/security/advisories?name=MDVSA-2011:123)
4. [](http://www.squirrelmail.org/security/issue/2011-07-11)
5. [RHSA-2012:0103](http://rhn.redhat.com/errata/RHSA-2012-0103.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-25658, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-25658 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-25658
- **State**: PUBLISHED
- **Published Date**: October 01, 2024 at 00:00 UTC
- **Last Updated**: November 22, 2024 at 19:12 UTC
- **Reserved Date**: February 09, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cleartext storage of passwords in Infinera TNMS (Transcend Network Management System) Server 19.10.3 allows attackers (with access to the database or exported configuration files) to obtain SNMP users' usernames and passwords in cleartext.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.cvcn.gov.it/cvcn/cve/CVE-2024-25658)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-9348, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-9348 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-9348
- **State**: PUBLISHED
- **Published Date**: October 16, 2024 at 14:50 UTC
- **Last Updated**: October 17, 2024 at 13:30 UTC
- **Reserved Date**: September 30, 2024 at 16:27 UTC
- **Assigned By**: Docker
### Vulnerability Description
Docker Desktop before v4.34.3 allows RCE via unsanitized GitHub source link in Build view.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Docker - Docker Desktop**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://docs.docker.com/desktop/release-notes/#4343)
### Credits
- Cure53
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-4473, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-4473 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-4473
- **State**: PUBLISHED
- **Published Date**: February 13, 2023 at 14:31 UTC
- **Last Updated**: March 21, 2025 at 14:46 UTC
- **Reserved Date**: December 14, 2022 at 04:30 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Widget Shortcode WordPress plugin through 0.3.5 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - Widget Shortcode**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/5117b2e9-75b5-459a-b22a-b0e1b0744bd3)
### Credits
- Lana Codes
- WPScan
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-0551, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-0551 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-0551
- **State**: PUBLISHED
- **Published Date**: July 04, 2015 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 04:10 UTC
- **Reserved Date**: December 17, 2014 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in EMC Documentum WebTop 6.7SP1 before P31, 6.7SP2 before P23, and 6.8 before P01; Documentum Administrator 6.7SP1 before P31, 6.7SP2 before P23, 7.0 before P18, 7.1 before P15, and 7.2 before P01; Documentum Digital Assets Manager 6.5SP6 before P25; Documentum Web Publishers 6.5 SP7 before P25; and Documentum Task Space 6.7SP1 before P31 and 6.7SP2 before P23 allow remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1032770](http://www.securitytracker.com/id/1032770)
2. [20150701 ESA-2015-111: EMC Documentum WebTop Client Products Multiple Vulnerabilities](http://seclists.org/bugtraq/2015/Jul/9)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-24682, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-24682 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-24682
- **State**: PUBLISHED
- **Published Date**: February 09, 2022 at 03:19 UTC
- **Last Updated**: January 29, 2025 at 21:19 UTC
- **Reserved Date**: February 09, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the Calendar feature in Zimbra Collaboration Suite 8.8.x before 8.8.15 patch 30 (update 1), as exploited in the wild starting in December 2021. An attacker could place HTML containing executable JavaScript inside element attributes. This markup becomes unescaped, causing arbitrary markup to be injected into the document.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories)
2. [](https://wiki.zimbra.com/wiki/Security_Center)
3. [](https://www.volexity.com/blog/2022/02/03/operation-emailthief-active-exploitation-of-zero-day-xss-vulnerability-in-zimbra/)
4. [](https://blog.zimbra.com/2022/02/hotfix-available-5-feb-for-zero-day-exploit-vulnerability-in-zimbra-8-8-15/)
5. [](https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P30)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-1513, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-1513 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-1513
- **State**: PUBLISHED
- **Published Date**: March 23, 2023 at 00:00 UTC
- **Last Updated**: February 25, 2025 at 19:33 UTC
- **Reserved Date**: March 20, 2023 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A flaw was found in KVM. When calling the KVM_GET_DEBUGREGS ioctl, on 32-bit systems, there might be some uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak.
### Weakness Classification (CWE)
- CWE-665: Security Weakness
### Affected Products
**n/a - Linux kernel (KVM)**
Affected versions:
- Fixed in kernel 6.2 (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=2179892)
2. [](https://lore.kernel.org/kvm/20230214103304.3689213-1-gregkh%40linuxfoundation.org/)
3. [](https://github.com/torvalds/linux/commit/2c10b61421a28e95a46ab489fd56c0f442ff6952)
4. [[debian-lts-announce] 20230502 [SECURITY] [DLA 3404-1] linux-5.10 security update](https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html)
5. [[debian-lts-announce] 20230503 [SECURITY] [DLA 3403-1] linux security update](https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-22136, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-22136 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-22136
- **State**: PUBLISHED
- **Published Date**: January 08, 2025 at 16:02 UTC
- **Last Updated**: January 08, 2025 at 19:25 UTC
- **Reserved Date**: December 30, 2024 at 03:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Tabby (formerly Terminus) is a highly configurable terminal emulator. Prior to 1.0.217 , Tabby enables several high-risk Electron Fuses, including RunAsNode, EnableNodeCliInspectArguments, and EnableNodeOptionsEnvironmentVariable. These fuses create potential code injection vectors even though the application is signed with hardened runtime and lacks dangerous entitlements such as com.apple.security.cs.disable-library-validation and com.apple.security.cs.allow-dyld-environment-variables. This vulnerability is fixed in 1.0.217.
### Weakness Classification (CWE)
- CWE-94: Code Injection
### Affected Products
**Eugeny - tabby**
Affected versions:
- < 1.0.217 (Status: affected)
### References
1. [https://github.com/Eugeny/tabby/security/advisories/GHSA-prcj-7rvc-26h4](https://github.com/Eugeny/tabby/security/advisories/GHSA-prcj-7rvc-26h4)
2. [https://github.com/Eugeny/tabby/commit/93513541f7161fa8a59491603cabb6a101c0c08e](https://github.com/Eugeny/tabby/commit/93513541f7161fa8a59491603cabb6a101c0c08e)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-5431, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-5431 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-5431
- **State**: PUBLISHED
- **Published Date**: March 26, 2019 at 15:37 UTC
- **Last Updated**: August 06, 2024 at 11:41 UTC
- **Reserved Date**: August 22, 2014 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Baxter SIGMA Spectrum Infusion System version 6.05 (model 35700BAX) with wireless battery module (WBM) version 16 contains a hard-coded password, which provides access to basic biomedical information, limited device settings, and network configuration of the WBM, if connected. The hard-coded password may allow an attacker with physical access to the device to access management functions to make unauthorized configuration changes to biomedical settings such as turn on and off wireless connections and the phase-complete audible alarm that indicates the end of an infusion phase. Baxter has released a new version of the SIGMA Spectrum Infusion System, version 8, which incorporates hardware and software changes.
### Weakness Classification (CWE)
- CWE-259: Security Weakness
### Affected Products
**Baxter - SIGMA Spectrum Infusion System**
Affected versions:
- 6.05 (model 35700BAX) with wireless battery module (WBM) version 16 (Status: affected)
### References
1. [](https://ics-cert.us-cert.gov/advisories/ICSA-15-181-01)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-27906, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-27906 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-27906
- **State**: PUBLISHED
- **Published Date**: April 17, 2023 at 00:00 UTC
- **Last Updated**: February 06, 2025 at 16:16 UTC
- **Reserved Date**: March 07, 2023 at 00:00 UTC
- **Assigned By**: autodesk
### Vulnerability Description
A malicious actor may convince a victim to open a malicious USD file that may trigger an out-of-bounds read vulnerability which may result in code execution.
### Affected Products
**n/a - Autodesk Maya USD Plugin**
Affected versions:
- 0.22.0 (Status: affected)
### References
1. [](https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0003)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-10516, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-10516 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-10516
- **State**: PUBLISHED
- **Published Date**: December 06, 2024 at 13:45 UTC
- **Last Updated**: December 06, 2024 at 15:56 UTC
- **Reserved Date**: October 29, 2024 at 21:34 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Swift Performance Lite plugin for WordPress is vulnerable to Local PHP File Inclusion in all versions up to, and including, 2.3.7.1 via the 'ajaxify' function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
### CVSS Metrics
- **CVSS Base Score**: 8.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**swte - Swift Performance Lite**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/4921f41a-a9b1-4ae2-a903-c14ed22dcc15?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/swift-performance-lite/trunk/includes/classes/class.ajax.php#L824)
3. [](https://plugins.trac.wordpress.org/browser/swift-performance-lite/trunk/includes/classes/class.ajax.php#L795)
4. [](https://plugins.trac.wordpress.org/changeset/3201933/)
### Credits
- Arkadiusz Hydzik
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-46376, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-46376 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-46376
- **State**: PUBLISHED
- **Published Date**: September 18, 2024 at 00:00 UTC
- **Last Updated**: September 19, 2024 at 13:49 UTC
- **Reserved Date**: September 11, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Best House Rental Management System 1.0 contains an arbitrary file upload vulnerability in the update_account() function of the file rental/admin_class.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/gaorenyusi/gaorenyusi/blob/main/CVE-2024-46376.md)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-7294, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-7294 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-7294
- **State**: PUBLISHED
- **Published Date**: September 06, 2017 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 07:43 UTC
- **Reserved Date**: September 18, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ldapauth-fork before 2.3.3 allows remote attackers to perform LDAP injection attacks via a crafted username.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20150921 Re: CVE request - ldapauth-fork versions < 2.3.3 are vulnerable to ldap injection.](http://www.openwall.com/lists/oss-security/2015/09/21/2)
2. [[oss-security] 20150918 Re: CVE request - ldapauth-fork versions < 2.3.3 are vulnerable to ldap injection.](http://www.openwall.com/lists/oss-security/2015/09/18/8)
3. [](https://github.com/vesse/node-ldapauth-fork/commit/3feea43e243698bcaeffa904a7324f4d96df60e4)
4. [](https://github.com/vesse/node-ldapauth-fork/issues/21)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-8134, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-8134 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-8134
- **State**: REJECTED
- **Published Date**: March 01, 2021 at 23:08 UTC
- **Last Updated**: March 01, 2021 at 23:08 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-47307, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-47307 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-47307
- **State**: PUBLISHED
- **Published Date**: November 30, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 21:09 UTC
- **Reserved Date**: November 06, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer Overflow vulnerability in /apply.cgi in Shenzhen Libituo Technology Co., Ltd LBT-T300-T310 v2.2.2.6 allows attackers to cause a denial of service via the ApCliAuthMode parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/forever-more-cjy/overflow/blob/main/LBT-T310%20Buffer%20overflow.md)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-28150, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-28150 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-28150
- **State**: PUBLISHED
- **Published Date**: March 09, 2021 at 17:53 UTC
- **Last Updated**: August 04, 2024 at 16:33 UTC
- **Reserved Date**: November 02, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
I-Net Software Clear Reports 20.10.136 web application accepts a user-controlled input that specifies a link to an external site, and uses the user supplied data in a Redirect.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://c41nc.co.uk/?page_id=85)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-26977, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-26977 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-26977
- **State**: PUBLISHED
- **Published Date**: May 01, 2024 at 05:20 UTC
- **Last Updated**: May 04, 2025 at 09:01 UTC
- **Reserved Date**: February 19, 2024 at 14:20 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
pci_iounmap(): Fix MMIO mapping leak
The #ifdef ARCH_HAS_GENERIC_IOPORT_MAP accidentally also guards iounmap(),
which means MMIO mappings are leaked.
Move the guard so we call iounmap() for MMIO mappings.
### Affected Products
**Linux - Linux**
Affected versions:
- 316e8d79a0959c302b0c462ab64b069599f10eef (Status: affected)
- 316e8d79a0959c302b0c462ab64b069599f10eef (Status: affected)
- 316e8d79a0959c302b0c462ab64b069599f10eef (Status: affected)
- 316e8d79a0959c302b0c462ab64b069599f10eef (Status: affected)
- 316e8d79a0959c302b0c462ab64b069599f10eef (Status: affected)
- 316e8d79a0959c302b0c462ab64b069599f10eef (Status: affected)
**Linux - Linux**
Affected versions:
- 5.15 (Status: affected)
- 0 (Status: unaffected)
- 5.15.154 (Status: unaffected)
- 6.1.84 (Status: unaffected)
- 6.6.24 (Status: unaffected)
- 6.7.12 (Status: unaffected)
- 6.8.3 (Status: unaffected)
- 6.9 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/5e4b23e7a7b33a1e56bfa3e5598138a2234d55b6)
2. [](https://git.kernel.org/stable/c/6d21d0356aa44157a62e39c0d1a13d4c69a8d0c8)
3. [](https://git.kernel.org/stable/c/b5d40f02e7222da032c2042aebcf2a07de9b342f)
4. [](https://git.kernel.org/stable/c/f3749345a9b7295dd071d0ed589634cb46364f77)
5. [](https://git.kernel.org/stable/c/af280e137e273935f2e09f4d73169998298792ed)
6. [](https://git.kernel.org/stable/c/7626913652cc786c238e2dd7d8740b17d41b2637)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-12104, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-12104 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-12104
- **State**: PUBLISHED
- **Published Date**: April 24, 2018 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 21:58 UTC
- **Reserved Date**: July 31, 2017 at 00:00 UTC
- **Assigned By**: talos
### Vulnerability Description
An exploitable integer overflow exists in the way that the Blender open-source 3d creation suite v2.78c draws a Particle object. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open the file or use the file as a library in order to trigger this vulnerability.
### Affected Products
**Blender - Blender**
Affected versions:
- v2.78c (32-bit) (Status: affected)
### References
1. [[debian-lts-announce] 20180813 [SECURITY] [DLA 1465-1] blender security update](https://lists.debian.org/debian-lts-announce/2018/08/msg00011.html)
2. [DSA-4248](https://www.debian.org/security/2018/dsa-4248)
3. [](https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0456)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-9914, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-9914 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-9914
- **State**: PUBLISHED
- **Published Date**: July 05, 2017 at 19:00 UTC
- **Last Updated**: August 05, 2024 at 17:24 UTC
- **Reserved Date**: June 25, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
XnView Classic for Windows Version 2.40 allows remote attackers to execute code via a crafted .bie file, related to a "Read Access Violation on Block Data Move starting at Xjbig+0x000000000000121b."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/wlinzi/security_advisories/tree/master/CVE-2017-9914)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-27807, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-27807 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-27807
- **State**: PUBLISHED
- **Published Date**: July 04, 2022 at 06:56 UTC
- **Last Updated**: August 03, 2024 at 05:33 UTC
- **Reserved Date**: April 28, 2022 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Improper input validation vulnerability in Link of Cybozu Garoon 4.0.0 to 5.5.1 allows a remote authenticated attacker to disable to add Categories.
### Affected Products
**Cybozu, Inc. - Cybozu Garoon**
Affected versions:
- 4.0.0 to 5.5.1 (Status: affected)
### References
1. [](https://cs.cybozu.co.jp/2022/007429.html)
2. [](https://jvn.jp/en/jp/JVN73897863/index.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-16844, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-16844 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16844
- **State**: PUBLISHED
- **Published Date**: November 16, 2017 at 15:00 UTC
- **Last Updated**: August 05, 2024 at 20:35 UTC
- **Reserved Date**: November 16, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Heap-based buffer overflow in the loadbuf function in formisc.c in formail in procmail 3.22 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted e-mail message because of a hardcoded realloc size, a different vulnerability than CVE-2014-3618.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[debian-lts-announce] 20171118 [SECURITY] [DLA 1173-1] procmail security update](https://lists.debian.org/debian-lts-announce/2017/11/msg00019.html)
2. [RHSA-2017:3269](https://access.redhat.com/errata/RHSA-2017:3269)
3. [](https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876511)
4. [DSA-4041](https://www.debian.org/security/2017/dsa-4041)
5. [1039844](http://www.securitytracker.com/id/1039844)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2005-0450, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2005-0450 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-0450
- **State**: PUBLISHED
- **Published Date**: February 16, 2005 at 05:00 UTC
- **Last Updated**: August 07, 2024 at 21:13 UTC
- **Reserved Date**: February 16, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in Sami HTTP Server 1.0.5 allows remote attackers to read arbitrary files via an HTTP request containing (1) .. (dot dot) or (2) "%2e%2e" (encoded dot dot) sequences.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1013191](http://securitytracker.com/id?1013191)
2. [14283](http://secunia.com/advisories/14283)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-30898, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-30898 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-30898
- **State**: PUBLISHED
- **Published Date**: August 24, 2021 at 18:50 UTC
- **Last Updated**: August 03, 2024 at 22:48 UTC
- **Reserved Date**: April 13, 2021 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An access issue was addressed with additional sandbox restrictions on third party applications. This issue is fixed in iOS 15 and iPadOS 15. A malicious application may be able to access some of the user's Apple ID information, or recent in-app search terms.
### Affected Products
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT212814)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-22037, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-22037 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-22037
- **State**: PUBLISHED
- **Published Date**: November 28, 2024 at 09:46 UTC
- **Last Updated**: November 28, 2024 at 12:15 UTC
- **Reserved Date**: January 04, 2024 at 12:38 UTC
- **Assigned By**: suse
### Vulnerability Description
The uyuni-server-attestation systemd service needs a database_password environment variable. This file has 640 permission, and cannot be shown users, but the environment is still exposed by systemd to non-privileged users.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-497: Security Weakness
### Affected Products
**SUSE - SUSE Manager Server 5.0**
Affected versions:
- ? (Status: affected)
**SUSE - SUSE Manager Server 5.0**
Affected versions:
- ? (Status: affected)
**SUSE - SUSE Manager Server 5.0**
Affected versions:
- ? (Status: affected)
**SUSE - SUSE Manager Server 5.0**
Affected versions:
- ? (Status: affected)
### References
1. [](https://bugzilla.suse.com/show_bug.cgi?id=CVE-2024-22037)
### Credits
- Cédric Bosdonnat of SUSE
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-10038, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-10038 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-10038
- **State**: PUBLISHED
- **Published Date**: December 24, 2016 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 03:07 UTC
- **Reserved Date**: December 24, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal in /connectors/index.php in MODX Revolution before 2.5.2-pl allows remote attackers to perform local file inclusion/traversal/manipulation via a crafted dir parameter, related to browser/directory/remove.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [95097](http://www.securityfocus.com/bid/95097)
2. [](https://github.com/modxcms/revolution/pull/13177)
3. [](https://raw.githubusercontent.com/modxcms/revolution/v2.5.2-pl/core/docs/changelog.txt)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-26876, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-26876 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-26876
- **State**: PUBLISHED
- **Published Date**: February 25, 2025 at 14:17 UTC
- **Last Updated**: February 25, 2025 at 14:39 UTC
- **Reserved Date**: February 17, 2025 at 11:49 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Path Traversal vulnerability in CodeManas Search with Typesense allows Path Traversal. This issue affects Search with Typesense: from n/a through 2.0.8.
### CVSS Metrics
- **CVSS Base Score**: 6.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-35: Security Weakness
### Affected Products
**CodeManas - Search with Typesense**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/search-with-typesense/vulnerability/wordpress-search-with-typesense-plugin-2-0-8-path-traversal-vulnerability?_s_id=cve)
### Credits
- astra.r3verii (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-14879, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-14879 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14879
- **State**: PUBLISHED
- **Published Date**: January 10, 2018 at 22:00 UTC
- **Last Updated**: September 16, 2024 at 22:08 UTC
- **Reserved Date**: September 28, 2017 at 00:00 UTC
- **Assigned By**: qualcomm
### Vulnerability Description
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, by calling an IPA ioctl and searching for routing/filer/hdr rule handle from ipa_idr pointer using ipa_idr_find() function, the wrong structure pointer can be returned resulting in a slab out of bound access in the IPA driver.
### Affected Products
**Qualcomm, Inc. - Android for MSM, Firefox OS for MSM, QRD Android**
Affected versions:
- All Android releases from CAF using the Linux kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2018-01-01)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2010-2060, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2010-2060 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-2060
- **State**: PUBLISHED
- **Published Date**: June 07, 2010 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 02:17 UTC
- **Reserved Date**: May 25, 2010 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The put command functionality in beanstalkd 1.4.5 and earlier allows remote attackers to execute arbitrary Beanstalk commands via the body in a job that is too big, which is not properly handled by the dispatch_cmd function in prot.c.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://kr.github.com/beanstalkd/2010/05/23/1.4.6-release-notes.html)
2. [](http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d)
3. [beanstalkd-put-command-execution(59107)](https://exchange.xforce.ibmcloud.com/vulnerabilities/59107)
4. [40032](http://secunia.com/advisories/40032)
5. [65113](http://osvdb.org/65113)
6. [40516](http://www.securityfocus.com/bid/40516)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-40568, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-40568 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-40568
- **State**: REJECTED
- **Last Updated**: August 25, 2023 at 19:36 UTC
- **Reserved Date**: August 16, 2023 at 18:24 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-0263, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-0263 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-0263
- **State**: PUBLISHED
- **Published Date**: February 12, 2014 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 09:13 UTC
- **Reserved Date**: December 03, 2013 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
The Direct2D implementation in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via a large 2D geometric figure that is encountered with Internet Explorer, aka "Microsoft Graphics Component Memory Corruption Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [56781](http://secunia.com/advisories/56781)
2. [MS14-007](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-007)
3. [103160](http://osvdb.org/103160)
4. [65393](http://www.securityfocus.com/bid/65393)
5. [1029743](http://www.securitytracker.com/id/1029743)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-1999-1144, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-1999-1144 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-1144
- **State**: PUBLISHED
- **Published Date**: March 09, 2002 at 05:00 UTC
- **Last Updated**: August 01, 2024 at 17:02 UTC
- **Reserved Date**: August 31, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Certain files in MPower in HP-UX 10.x are installed with insecure permissions, which allows local users to gain privileges.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [HPSBUX9701-051](http://www.codetalker.com/advisories/vendor/hp/hpsbux9701-051.html)
2. [hp-mpower(2056)](https://exchange.xforce.ibmcloud.com/vulnerabilities/2056)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-4341, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-4341 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-4341
- **State**: PUBLISHED
- **Published Date**: August 15, 2023 at 18:25 UTC
- **Last Updated**: October 08, 2024 at 19:43 UTC
- **Reserved Date**: August 14, 2023 at 21:27 UTC
- **Assigned By**: certcc
### Vulnerability Description
Broadcom RAID Controller is vulnerable to Privilege escalation to root due to creation of insecure folders by Web GUI
### Affected Products
**Broadcom - LSI Storage Authority (LSA)**
Affected versions:
- 0 (Status: affected)
**Intel - RAID Web Console 3 (RWC3)**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.broadcom.com/support/resources/product-security-center)
### Credits
- Intel DCG
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-27764, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-27764 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-27764
- **State**: REJECTED
- **Last Updated**: March 17, 2025 at 22:37 UTC
- **Reserved Date**: March 06, 2025 at 14:36 UTC
- **Assigned By**: fortinet
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2015-5303, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2015-5303 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-5303
- **State**: PUBLISHED
- **Published Date**: April 11, 2016 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 06:41 UTC
- **Reserved Date**: July 01, 2015 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The TripleO Heat templates (tripleo-heat-templates), when deployed via the commandline interface, allow remote attackers to spoof OpenStack Networking metadata requests by leveraging knowledge of the default value of the NeutronMetadataProxySharedSecret parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2015:2650](https://access.redhat.com/errata/RHSA-2015:2650)
2. [](https://bugs.launchpad.net/tripleo/+bug/1516027)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-1221, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-1221 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1221
- **State**: PUBLISHED
- **Published Date**: May 23, 2022 at 07:15 UTC
- **Last Updated**: August 02, 2024 at 23:55 UTC
- **Reserved Date**: April 04, 2022 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Gwyn's Imagemap Selector WordPress plugin through 0.3.3 does not sanitise and escape some parameters before outputting them back in attributes, leading to a Reflected Cross-Site Scripting.
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Unknown - Gwyn's Imagemap Selector**
Affected versions:
- 0.3.3 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/641be9f6-2f74-4386-b16e-4b9488f0d2a9)
### Credits
- p7e4
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-8881, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-8881 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-8881
- **State**: PUBLISHED
- **Published Date**: March 20, 2018 at 23:00 UTC
- **Last Updated**: August 05, 2024 at 07:10 UTC
- **Reserved Date**: March 20, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Netwide Assembler (NASM) 2.13.02rc2 has a heap-based buffer over-read in the function tokenize in asm/preproc.c, related to an unterminated string.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.nasm.us/show_bug.cgi?id=3392446)
2. [USN-3694-1](https://usn.ubuntu.com/3694-1/)
3. [openSUSE-SU-2020:0952](http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html)
4. [openSUSE-SU-2020:0954](http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-10093, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-10093 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-10093
- **State**: PUBLISHED
- **Published Date**: August 08, 2017 at 15:00 UTC
- **Last Updated**: October 04, 2024 at 19:04 UTC
- **Reserved Date**: June 21, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Agile PLM component of Oracle Supply Chain Products Suite (subcomponent: Security). Supported versions that are affected are 9.3.5 and 9.3.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Agile PLM. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Agile PLM accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
### Affected Products
**Oracle Corporation - Agile PLM Framework**
Affected versions:
- 9.3.5 (Status: affected)
- 9.3.6 (Status: affected)
### References
1. [99692](http://www.securityfocus.com/bid/99692)
2. [1038947](http://www.securitytracker.com/id/1038947)
3. [](http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-24728, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-24728 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-24728
- **State**: PUBLISHED
- **Published Date**: March 16, 2022 at 00:00 UTC
- **Last Updated**: April 23, 2025 at 18:53 UTC
- **Reserved Date**: February 10, 2022 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
CKEditor4 is an open source what-you-see-is-what-you-get HTML editor. A vulnerability has been discovered in the core HTML processing module and may affect all plugins used by CKEditor 4 prior to version 4.18.0. The vulnerability allows someone to inject malformed HTML bypassing content sanitization, which could result in executing JavaScript code. This problem has been patched in version 4.18.0. There are currently no known workarounds.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**ckeditor - ckeditor4**
Affected versions:
- < 4.18.0 (Status: affected)
### References
1. [](https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-4fc4-4p5g-6w89)
2. [](https://github.com/ckeditor/ckeditor4/commit/d158413449692d920a778503502dcb22881bc949)
3. [](https://ckeditor.com/cke4/release/CKEditor-4.18.0)
4. [](https://www.oracle.com/security-alerts/cpujul2022.html)
5. [](https://www.drupal.org/sa-core-2022-005)
6. [FEDORA-2022-b61dfd219b](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WOZGMCYDB2OKKULFXZKM6V7JJW4ZZHJP/)
7. [FEDORA-2022-4c634ee466](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VR76VBN5GW5QUBJFHVXRX36UZ6YTCMW6/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-43524, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-43524 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-43524
- **State**: PUBLISHED
- **Published Date**: October 08, 2024 at 17:35 UTC
- **Last Updated**: January 29, 2025 at 23:50 UTC
- **Reserved Date**: August 14, 2024 at 01:08 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 6.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-118: Security Weakness
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows 11 version 21H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19043.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows 11 version 22H3**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows 11 Version 23H2**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)**
Affected versions:
- 10.0.25398.0 (Status: affected)
**Microsoft - Windows 11 Version 24H2**
Affected versions:
- 10.0.26100.0 (Status: affected)
### References
1. [Windows Mobile Broadband Driver Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43524)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-45290, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-45290 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-45290
- **State**: PUBLISHED
- **Published Date**: March 05, 2024 at 22:22 UTC
- **Last Updated**: February 13, 2025 at 17:14 UTC
- **Reserved Date**: October 06, 2023 at 17:06 UTC
- **Assigned By**: Go
### Vulnerability Description
When parsing a multipart form (either explicitly with Request.ParseMultipartForm or implicitly with Request.FormValue, Request.PostFormValue, or Request.FormFile), limits on the total size of the parsed form were not applied to the memory consumed while reading a single form line. This permits a maliciously crafted input containing very long lines to cause allocation of arbitrarily large amounts of memory, potentially leading to memory exhaustion. With fix, the ParseMultipartForm function now correctly limits the maximum size of form lines.
### Affected Products
**Go standard library - net/textproto**
Affected versions:
- 0 (Status: affected)
- 1.22.0-0 (Status: affected)
### References
1. [](https://go.dev/issue/65383)
2. [](https://go.dev/cl/569341)
3. [](https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg)
4. [](https://pkg.go.dev/vuln/GO-2024-2599)
5. [](https://security.netapp.com/advisory/ntap-20240329-0004/)
6. [](http://www.openwall.com/lists/oss-security/2024/03/08/4)
### Credits
- Bartek Nowotarski
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-26715, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-26715 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-26715
- **State**: PUBLISHED
- **Published Date**: May 26, 2022 at 18:50 UTC
- **Last Updated**: August 03, 2024 at 05:11 UTC
- **Reserved Date**: March 08, 2022 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in Security Update 2022-004 Catalina, macOS Monterey 12.4, macOS Big Sur 11.6.6. An application may be able to gain elevated privileges.
### Affected Products
**Apple - Security Update - Catalina**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT213255)
2. [](https://support.apple.com/en-us/HT213256)
3. [](https://support.apple.com/en-us/HT213257)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-3484, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-3484 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-3484
- **State**: PUBLISHED
- **Published Date**: July 21, 2023 at 13:01 UTC
- **Last Updated**: May 22, 2025 at 04:06 UTC
- **Reserved Date**: June 30, 2023 at 17:18 UTC
- **Assigned By**: GitLab
### Vulnerability Description
An issue has been discovered in GitLab EE affecting all versions starting from 12.8 before 15.11.11, all versions starting from 16.0 before 16.0.7, all versions starting from 16.1 before 16.1.2. An attacker could change the name or path of a public top-level group in certain situations.
### CVSS Metrics
- **CVSS Base Score**: 8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-863: Incorrect Authorization
### Affected Products
**GitLab - GitLab**
Affected versions:
- 12.8 (Status: affected)
- 16.0 (Status: affected)
- 16.1 (Status: affected)
### References
1. [GitLab Issue #416773](https://gitlab.com/gitlab-org/gitlab/-/issues/416773)
2. [HackerOne Bug Bounty Report #2035687](https://hackerone.com/reports/2035687)
### Credits
- Thanks [zeb0x01](https://hackerone.com/zeb0x01) for reporting this vulnerability through our HackerOne bug bounty program
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-8606, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-8606 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-8606
- **State**: PUBLISHED
- **Published Date**: July 11, 2017 at 21:00 UTC
- **Last Updated**: September 17, 2024 at 04:20 UTC
- **Reserved Date**: May 03, 2017 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft browsers in Microsoft Windows 7, Windows Server 2008 and R2, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user when the JavaScript engines fail to render when handling objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8598, CVE-2017-8596, CVE-2017-8618, CVE-2017-8619, CVE-2017-8610, CVE-2017-8601, CVE-2017-8603, CVE-2017-8604, CVE-2017-8605, CVE-2017-8595, CVE-2017-8607, CVE-2017-8608, and CVE-2017-8609
### Affected Products
**Microsoft Corporation - Microsoft Windows 7, Windows Server 2008 and R2, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016**
Affected versions:
- Microsoft broswers (Status: affected)
### References
1. [1038848](http://www.securitytracker.com/id/1038848)
2. [1038849](http://www.securitytracker.com/id/1038849)
3. [](https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2017-8606)
4. [99408](http://www.securityfocus.com/bid/99408)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-41519, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-41519 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-41519
- **State**: PUBLISHED
- **Published Date**: August 02, 2024 at 00:00 UTC
- **Last Updated**: October 29, 2024 at 20:38 UTC
- **Reserved Date**: July 18, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Feripro <= v2.2.3 is vulnerable to Cross Site Scripting (XSS) via "/admin/programm/<program_id>/zuordnung/veranstaltungen/<event_id>" through the "school" input field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://piuswalter.de/blog/multiple-vulnerabilities-in-feripro/)
2. [](http://feripro.de)
3. [](http://mecodia.de)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-25891, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-25891 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-25891
- **State**: PUBLISHED
- **Published Date**: March 28, 2023 at 00:00 UTC
- **Last Updated**: March 05, 2025 at 19:18 UTC
- **Reserved Date**: February 15, 2023 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Adobe - Dimension**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/dimension/apsb23-20.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-42555, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-42555 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-42555
- **State**: PUBLISHED
- **Published Date**: November 07, 2023 at 07:49 UTC
- **Last Updated**: August 02, 2024 at 19:23 UTC
- **Reserved Date**: September 11, 2023 at 23:55 UTC
- **Assigned By**: Samsung Mobile
### Vulnerability Description
Use of implicit intent for sensitive communication vulnerability in EasySetup prior to version 11.1.13 allows attackers to get the bluetooth address of user device.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N`
### Affected Products
**Samsung Mobile - EasySetup**
Affected versions:
- 11.1.13 (Status: unaffected)
### References
1. [](https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=11)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2022-39819, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2022-39819 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-39819
- **State**: PUBLISHED
- **Published Date**: September 13, 2022 at 20:36 UTC
- **Last Updated**: August 03, 2024 at 12:07 UTC
- **Reserved Date**: September 05, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In NOKIA 1350 OMS R14.2, multiple OS Command Injection vulnerabilities occurs. This allows authenticated users to execute commands on the operating system.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.gruppotim.it/it/footer/red-team.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-12481, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-12481 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-12481
- **State**: PUBLISHED
- **Published Date**: December 11, 2024 at 19:31 UTC
- **Last Updated**: December 11, 2024 at 21:17 UTC
- **Reserved Date**: December 11, 2024 at 12:34 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in cjbi wetech-cms 1.0/1.1/1.2. It has been declared as critical. Affected by this vulnerability is the function findUser of the file wetech-cms-master\wetech-core\src\main\java\tech\wetech\cms\dao\UserDao.java. The manipulation of the argument searchValue/gId/rId leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**cjbi - wetech-cms**
Affected versions:
- 1.0 (Status: affected)
- 1.1 (Status: affected)
- 1.2 (Status: affected)
### References
1. [VDB-287863 | cjbi wetech-cms UserDao.java findUser sql injection](https://vuldb.com/?id.287863)
2. [VDB-287863 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.287863)
3. [Submit #458852 | cjbi wetech-cms UserDao.java searchValue,gId,rId 1 SQL Injection](https://vuldb.com/?submit.458852)
4. [](https://github.com/hadagaga/vuln/blob/master/wetech-cms/sql-3/SQL_injection_vulnerability.md)
### Credits
- hadagaga (VulDB User)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2025-25759, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2025-25759 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-25759
- **State**: PUBLISHED
- **Published Date**: February 27, 2025 at 00:00 UTC
- **Last Updated**: March 04, 2025 at 14:38 UTC
- **Reserved Date**: February 07, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue in the component admin_template.php of SUCMS v1.0 allows attackers to execute a directory traversal and arbitrary file deletion via a crafted GET request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/147536951/Qianyi-learn/blob/main/SUCMS.pdf)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-20559, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-20559 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-20559
- **State**: PUBLISHED
- **Published Date**: March 24, 2020 at 18:26 UTC
- **Last Updated**: August 05, 2024 at 02:46 UTC
- **Reserved Date**: March 23, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered on Samsung mobile devices with P(9.0) software. Gallery allows viewing of photos on the lock screen. The Samsung ID is SVE-2019-15055 (October 2019).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://security.samsungmobile.com/securityUpdate.smsb)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-41172, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-41172 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-41172
- **State**: PUBLISHED
- **Published Date**: October 26, 2021 at 14:00 UTC
- **Last Updated**: August 04, 2024 at 02:59 UTC
- **Reserved Date**: September 15, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
AS_Redis is an AntSword plugin for Redis. The Redis Manage plugin for AntSword prior to version 0.5 is vulnerable to Self-XSS due to due to insufficient input validation and sanitization via redis server configuration. Self-XSS in the plugin configuration leads to code execution. This issue is patched in version 0.5.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Medicean - AS_Redis**
Affected versions:
- < 0.5 (Status: affected)
### References
1. [](https://github.com/Medicean/AS_Redis/security/advisories/GHSA-j8j6-f829-w425)
2. [](https://github.com/AntSword-Store/AS_Redis/issues/1)
3. [](https://mp.weixin.qq.com/s/yjuG6DLT_bSRnpggPj21Xw)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-34419, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-34419 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-34419
- **State**: PUBLISHED
- **Published Date**: May 09, 2024 at 11:31 UTC
- **Last Updated**: August 02, 2024 at 02:51 UTC
- **Reserved Date**: May 03, 2024 at 07:31 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Nathan Vonnahme Configure Login Timeout allows Stored XSS.This issue affects Configure Login Timeout: from n/a through 1.0.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Nathan Vonnahme - Configure Login Timeout**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/configure-login-timeout/wordpress-configure-login-timeout-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Sharanabasappa (Patchstack Alliance)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-5356, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-5356 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-5356
- **State**: PUBLISHED
- **Published Date**: August 07, 2016 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 01:00 UTC
- **Reserved Date**: June 09, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
wiretap/cosine.c in the CoSine file parser in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles sscanf unsigned-integer processing, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20160609 Re: CVE Request: wireshark releases](http://www.openwall.com/lists/oss-security/2016/06/09/3)
2. [](https://github.com/wireshark/wireshark/commit/f5ec0afb766f19519ea9623152cca3bbe2229500)
3. [](http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html)
4. [](https://github.com/wireshark/wireshark/commit/a66628e425db725df1ac52a3c573a03357060ddd)
5. [](https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12395)
6. [DSA-3615](http://www.debian.org/security/2016/dsa-3615)
7. [91140](http://www.securityfocus.com/bid/91140)
8. [](https://www.wireshark.org/security/wnpa-sec-2016-35.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-1274, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-1274 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-1274
- **State**: PUBLISHED
- **Published Date**: January 20, 2021 at 19:56 UTC
- **Last Updated**: November 12, 2024 at 20:24 UTC
- **Reserved Date**: November 13, 2020 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Multiple vulnerabilities in Cisco SD-WAN products could allow an unauthenticated, remote attacker to execute denial of service (DoS) attacks against an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
### CVSS Metrics
- **CVSS Base Score**: 8.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-119: Security Weakness
### Affected Products
**Cisco - Cisco SD-WAN Solution**
Affected versions:
- n/a (Status: affected)
### References
1. [20210120 Cisco SD-WAN Denial of Service Vulnerabilities](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-dosmulti-48jJuEUP)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2009-4268, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2009-4268 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4268
- **State**: REJECTED
- **Published Date**: May 26, 2017 at 21:00 UTC
- **Last Updated**: May 26, 2017 at 20:57 UTC
- **Reserved Date**: December 10, 2009 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2017-0236, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2017-0236 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-0236
- **State**: PUBLISHED
- **Published Date**: May 12, 2017 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 12:55 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
A remote code execution vulnerability exists in Microsoft Edge in the way that the Chakra JavaScript engine renders when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability." This CVE ID is unique from CVE-2017-0224, CVE-2017-0228, CVE-2017-0229, CVE-2017-0230, CVE-2017-0234, CVE-2017-0235, and CVE-2017-0238.
### Affected Products
**Microsoft Corporation - Microsoft Edge**
Affected versions:
- Windows 10 for 32-bit Systems, Windows 10 for x64-based Systems, Windows 10 Version 1511 for 32-bit Systems, Windows 10 Version 1511 for x64-based Systems, Windows 10 Version 1607 for 32-bit Systems, Windows 10 Version 1607 for x64-based Systems, Windows 10 Version 1703 for 32-bit Systems, and Windows 10 Version 1703 for x64-based Systems. (Status: affected)
### References
1. [1038431](http://www.securitytracker.com/id/1038431)
2. [98234](http://www.securityfocus.com/bid/98234)
3. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0236)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-49129, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-49129 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-49129
- **State**: PUBLISHED
- **Published Date**: December 10, 2024 at 17:49 UTC
- **Last Updated**: May 13, 2025 at 15:25 UTC
- **Reserved Date**: October 11, 2024 at 20:57 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-400: Security Weakness
### Affected Products
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows Server 2025 (Server Core installation)**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)**
Affected versions:
- 10.0.25398.0 (Status: affected)
**Microsoft - Windows Server 2025**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49129)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2008-1308, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2008-1308 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-1308
- **State**: PUBLISHED
- **Published Date**: March 12, 2008 at 17:00 UTC
- **Last Updated**: August 07, 2024 at 08:17 UTC
- **Reserved Date**: March 12, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in the Sudirman Angriawan NukeC30 3.0 module for PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the id_catg parameter in a ViewCatg action to modules.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [28197](http://www.securityfocus.com/bid/28197)
2. [3733](http://securityreason.com/securityalert/3733)
3. [20080311 PHP-Nuke Module NukeC30 sql injection](http://www.securityfocus.com/archive/1/489387/100/0/threaded)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-17681, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-17681 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-17681
- **State**: PUBLISHED
- **Published Date**: January 24, 2019 at 04:00 UTC
- **Last Updated**: August 05, 2024 at 10:54 UTC
- **Reserved Date**: September 28, 2018 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the getPageBox method of a Form. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7141.
### Weakness Classification (CWE)
- CWE-416: Use After Free
### Affected Products
**Foxit - Reader**
Affected versions:
- 9.2.0.9297 (Status: affected)
### References
1. [](https://www.foxitsoftware.com/support/security-bulletins.php)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-18-1196/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-14896, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-14896 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-14896
- **State**: PUBLISHED
- **Published Date**: October 21, 2020 at 14:04 UTC
- **Last Updated**: September 26, 2024 at 20:01 UTC
- **Reserved Date**: June 19, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Banking Payments product of Oracle Financial Services Applications (component: Core). Supported versions that are affected are 14.1.0-14.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Payments. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Banking Payments accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Affected Products
**Oracle Corporation - Banking Payments**
Affected versions:
- 14.1.0-14.4.0 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuoct2020.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-12179, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-12179 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-12179
- **State**: PUBLISHED
- **Published Date**: March 27, 2019 at 19:21 UTC
- **Last Updated**: August 05, 2024 at 08:30 UTC
- **Reserved Date**: June 11, 2018 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Improper configuration in system firmware for EDK II may allow unauthenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via local access.
### Affected Products
**Extensible Firmware Interface Development Kit (EDK II) - Extensible Firmware Interface Development Kit (EDK II)**
Affected versions:
- N/A (Status: affected)
### References
1. [](https://edk2-docs.gitbooks.io/security-advisory/content/opal-blocksid-setting-disabled-after-s3.html)
2. [](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us)
3. [FEDORA-2019-d47a9d4b8b](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQYVZRFEXSN3KS43AVH4D7QX553EZQYP/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2009-1590, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2009-1590 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-1590
- **State**: PUBLISHED
- **Published Date**: May 08, 2009 at 18:00 UTC
- **Last Updated**: September 16, 2024 at 19:04 UTC
- **Reserved Date**: May 08, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in CGI RESCUE FORM2MAIL before 1.42 allows remote attackers to send email to arbitrary recipients via a web form.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [JVNDB-2009-000023](http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000023.html)
2. [54097](http://osvdb.org/54097)
3. [](http://www.rescue.ne.jp/whatsnew/blog.cgi/permalink/20081213132937)
4. [JVN#76370393](http://jvn.jp/en/jp/JVN76370393/index.html)
5. [34869](http://secunia.com/advisories/34869)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-37455, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-37455 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-37455
- **State**: PUBLISHED
- **Published Date**: July 12, 2023 at 13:46 UTC
- **Last Updated**: November 07, 2024 at 15:04 UTC
- **Reserved Date**: July 06, 2023 at 12:47 UTC
- **Assigned By**: mozilla
### Vulnerability Description
The permission request prompt from the site in the background tab was overlaid on top of the site in the foreground tab. This vulnerability affects Firefox for iOS < 115.
### Affected Products
**Mozilla - Firefox for iOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1786934)
2. [](https://www.mozilla.org/security/advisories/mfsa2023-25/)
### Credits
- Kazuki Nomoto
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2019-14905, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2019-14905 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-14905
- **State**: PUBLISHED
- **Published Date**: March 31, 2020 at 16:20 UTC
- **Last Updated**: August 05, 2024 at 00:34 UTC
- **Reserved Date**: August 10, 2019 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
A vulnerability was found in Ansible Engine versions 2.9.x before 2.9.3, 2.8.x before 2.8.8, 2.7.x before 2.7.16 and earlier, where in Ansible's nxos_file_copy module can be used to copy files to a flash or bootflash on NXOS devices. Malicious code could craft the filename parameter to perform OS command injections. This could result in a loss of confidentiality of the system among other issues.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
- CWE-73: Security Weakness
### Affected Products
**Red Hat - Ansible**
Affected versions:
- 2.9.x before 2.9.3 (Status: affected)
- 2.8.x before 2.8.8 (Status: affected)
- 2.7.x before 2.7.16 (Status: affected)
- 2.7.x and earlier (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14905)
2. [RHSA-2020:0218](https://access.redhat.com/errata/RHSA-2020:0218)
3. [RHSA-2020:0216](https://access.redhat.com/errata/RHSA-2020:0216)
4. [FEDORA-2020-2bed89517f](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5BNCYPQ4BY5QHBCJOAOPANB5FHATW2BR/)
5. [openSUSE-SU-2020:0513](http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html)
6. [openSUSE-SU-2020:0523](http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2023-50991, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2023-50991 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-50991
- **State**: PUBLISHED
- **Published Date**: January 05, 2024 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 22:23 UTC
- **Reserved Date**: December 18, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer Overflow vulnerability in Tenda i29 versions 1.0 V1.0.0.5 and 1.0 V1.0.0.2, allows remote attackers to cause a denial of service (DoS) via the pingIp parameter in the pingSet function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/ef4tless/vuln/blob/master/iot/i29/pingSet.md)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2018-10144, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2018-10144 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-10144
- **State**: REJECTED
- **Published Date**: January 17, 2019 at 15:00 UTC
- **Last Updated**: January 17, 2019 at 14:57 UTC
- **Reserved Date**: April 16, 2018 at 00:00 UTC
- **Assigned By**: palo_alto
### Vulnerability Description
No description available
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2016-2493, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2016-2493 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-2493
- **State**: PUBLISHED
- **Published Date**: June 13, 2016 at 01:00 UTC
- **Last Updated**: August 05, 2024 at 23:32 UTC
- **Reserved Date**: February 18, 2016 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
The Broadcom Wi-Fi driver in Android before 2016-06-01 on Nexus 5, Nexus 6, Nexus 6P, Nexus 7 (2013), Nexus Player, and Pixel C devices allows attackers to gain privileges via a crafted application, aka internal bug 26571522.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://source.android.com/security/bulletin/2016-06-01.html)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2012-1982, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2012-1982 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-1982
- **State**: PUBLISHED
- **Published Date**: April 04, 2012 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 19:17 UTC
- **Reserved Date**: March 30, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in my_admin/admin1_list_pages.php in SocialCMS 1.0.2 and earlier allows remote authenticated users to inject arbitrary web script or HTML via the TR_title parameter in an edit action.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [socialcms-admin1listpages-xss(74540)](https://exchange.xforce.ibmcloud.com/vulnerabilities/74540)
2. [](http://www.webapp-security.com/wp-content/uploads/2012/03/SocialCMS-1.0.2-XSS-Persistent-and-Reflected-Vulnerabilities1.txt)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-8653, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-8653 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-8653
- **State**: PUBLISHED
- **Published Date**: November 06, 2014 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 13:26 UTC
- **Reserved Date**: November 06, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Compal Broadband Networks (CBN) CH6640E and CG6640E Wireless Gateway 1.0 with firmware CH6640-3.5.11.7-NOSH allows remote attackers to inject arbitrary web script or HTML via the userData cookie.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5203.php)
2. [70762](http://www.securityfocus.com/bid/70762)
3. [cbn-ch6640ecg6640e-xss(98328)](https://exchange.xforce.ibmcloud.com/vulnerabilities/98328)
4. [35075](http://www.exploit-db.com/exploits/35075)
5. [](http://packetstormsecurity.com/files/128860/CBN-CH6640E-CG6640E-Wireless-Gateway-XSS-CSRF-DoS-Disclosure.html)
6. [113839](http://osvdb.org/show/osvdb/113839)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2024-36424, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2024-36424 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-36424
- **State**: PUBLISHED
- **Published Date**: August 06, 2024 at 00:00 UTC
- **Last Updated**: March 13, 2025 at 19:32 UTC
- **Reserved Date**: May 27, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
K7RKScan.sys in K7 Ultimate Security before 17.0.2019 allows local users to cause a denial of service (BSOD) because of a NULL pointer dereference.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.k7computing.com/)
2. [](https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-5th-aug-2024-417)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2008-3335, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2008-3335 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-3335
- **State**: PUBLISHED
- **Published Date**: July 27, 2008 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 09:37 UTC
- **Reserved Date**: July 27, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in PunBB before 1.2.19 allows remote attackers to inject arbitrary SMTP commands via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://punbb.informer.com/download/changelogs/1.2.17_to_1.2.19.txt)
2. [30395](http://www.securityfocus.com/bid/30395)
3. [](http://punbb.informer.com/)
4. [](http://punbb.informer.com/forums/topic/19539/punbb-1219/)
5. [punbb-smtp-command-execution(44010)](https://exchange.xforce.ibmcloud.com/vulnerabilities/44010)
6. [31219](http://secunia.com/advisories/31219)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2020-6329, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2020-6329 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-6329
- **State**: PUBLISHED
- **Published Date**: September 09, 2020 at 12:51 UTC
- **Last Updated**: August 04, 2024 at 08:55 UTC
- **Reserved Date**: January 08, 2020 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated SKP file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.
### Affected Products
**SAP SE - SAP 3D Visual Enterprise Viewer**
Affected versions:
- < 9 (Status: affected)
### References
1. [](https://launchpad.support.sap.com/#/notes/2960815)
2. [](https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=557449700)
3. [](https://www.zerodayinitiative.com/advisories/ZDI-20-1136/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2021-20461, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2021-20461 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-20461
- **State**: PUBLISHED
- **Published Date**: June 30, 2021 at 13:25 UTC
- **Last Updated**: September 16, 2024 at 22:30 UTC
- **Reserved Date**: December 17, 2020 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Cognos Analytics 10.0 and 11.1 is susceptible to a weakness in the implementation of the System Appearance configuration setting. An attacker could potentially bypass business logic to modify the appearance and behavior of the application. IBM X-Force ID: 196770.
### Affected Products
**IBM - Cognos Analytics**
Affected versions:
- 11.0 (Status: affected)
- 11.1 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6466729)
2. [ibm-cognos-cve202120461-gain-access (196770)](https://exchange.xforce.ibmcloud.com/vulnerabilities/196770)
3. [](https://security.netapp.com/advisory/ntap-20210720-0007/)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2014-9941, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2014-9941 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-9941
- **State**: PUBLISHED
- **Published Date**: June 06, 2017 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 14:02 UTC
- **Reserved Date**: March 28, 2017 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In the Embedded File System in all Android releases from CAF using the Linux kernel, a Time-of-Check Time-of-Use Race Condition vulnerability could potentially exist.
### Affected Products
**Qualcomm, Inc. - All Qualcomm products**
Affected versions:
- All Android releases from CAF using the Linux kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/2017-05-01)
2. [98242](http://www.securityfocus.com/bid/98242)
|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights.
|
Provide a comprehensive technical analysis of CVE-2012-0690, including exploitation vectors, impact assessment, and remediation strategies.
|
## CVE-2012-0690 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-0690
- **State**: PUBLISHED
- **Published Date**: March 13, 2012 at 10:00 UTC
- **Last Updated**: September 17, 2024 at 01:41 UTC
- **Reserved Date**: January 12, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
TIBCO Spotfire Web Application, Web Player Application, Automation Services Application, and Analytics Client Application in Spotfire Analytics Server before 10.1.2; Server before 3.3.3; and Web Player, Automation Services, and Professional before 4.0.2 allow remote attackers to obtain sensitive information via a crafted URL.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.tibco.com/services/support/advisories/amx-be-spotfire-advisory_20120308.jsp)
2. [](http://www.tibco.com/multimedia/spotfire_advisory_20120308_tcm8-15731.txt)
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.