System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-21731, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-21731 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-21731
- **State**: PUBLISHED
- **Published Date**: February 03, 2022 at 11:37 UTC
- **Last Updated**: May 05, 2025 at 16:32 UTC
- **Reserved Date**: November 16, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Tensorflow is an Open Source Machine Learning Framework. The implementation of shape inference for `ConcatV2` can be used to trigger a denial of service attack via a segfault caused by a type confusion. The `axis` argument is translated into `concat_dim` in the `ConcatShapeHelper` helper function. Then, a value for `min_rank` is computed based on `concat_dim`. This is then used to validate that the `values` tensor has at least the required rank. However, `WithRankAtLeast` receives the lower bound as a 64-bits value and then compares it against the maximum 32-bits integer value that could be represented. Due to the fact that `min_rank` is a 32-bits value and the value of `axis`, the `rank` argument is a negative value, so the error check is bypassed. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m4hf-j54p-p353)
2. [](https://github.com/tensorflow/tensorflow/commit/08d7b00c0a5a20926363849f611729f53f3ec022)
3. [](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/framework/common_shape_fns.cc#L1961-L2059)
4. [](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/framework/shape_inference.cc#L345-L358) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-2119, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-2119 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-2119
- **State**: PUBLISHED
- **Published Date**: June 16, 2011 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 22:53 UTC
- **Reserved Date**: May 13, 2011 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, and CVE-2011-2122.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.adobe.com/support/security/bulletins/apsb11-17.html)
2. [TA11-166A](http://www.us-cert.gov/cas/techalerts/TA11-166A.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-2514, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-2514 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-2514
- **State**: PUBLISHED
- **Published Date**: October 25, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:29 UTC
- **Reserved Date**: October 25, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in modules/private_messages/index.php in PowerPortal 1.x allows remote attackers to inject arbitrary web script or HTML via the (1) SUBJECT or (2) MESSAGE field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [powerportal-private-message-xss(16838)](https://exchange.xforce.ibmcloud.com/vulnerabilities/16838)
2. [1010802](http://securitytracker.com/id?1010802)
3. [8319](http://www.osvdb.org/8319)
4. [](http://www.secure4arab.com/forum/showthread.php?t=302)
5. [](http://www.securiteam.com/unixfocus/5TP0O2ADFK.html)
6. [10835](http://www.securityfocus.com/bid/10835) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-9072, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-9072 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-9072
- **State**: PUBLISHED
- **Published Date**: November 30, 2018 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 07:17 UTC
- **Reserved Date**: March 27, 2018 at 00:00 UTC
- **Assigned By**: lenovo
### Vulnerability Description
In versions prior to 5.5, LXCI for VMware allows an authenticated user to download any system file due to insufficient input sanitization during file downloads.
### Affected Products
**Lenovo - LXCI for VMware**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.lenovo.com/us/en/solutions/LEN-23800) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-20823, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-20823 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-20823
- **State**: PUBLISHED
- **Published Date**: August 25, 2022 at 18:40 UTC
- **Last Updated**: November 06, 2024 at 16:07 UTC
- **Reserved Date**: November 02, 2021 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the OSPF version 3 (OSPFv3) feature of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to incomplete input validation of specific OSPFv3 packets. An attacker could exploit this vulnerability by sending a malicious OSPFv3 link-state advertisement (LSA) to an affected device. A successful exploit could allow the attacker to cause the OSPFv3 process to crash and restart multiple times, causing the affected device to reload and resulting in a DoS condition. Note: The OSPFv3 feature is disabled by default. To exploit this vulnerability, an attacker must be able to establish a full OSPFv3 neighbor state with an affected device. For more information about exploitation conditions, see the Details section of this advisory.
### CVSS Metrics
- **CVSS Base Score**: 8.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-126: Security Weakness
### Affected Products
**Cisco - Cisco NX-OS Software**
Affected versions:
- n/a (Status: affected)
### References
1. [20220824 Cisco NX-OS Software OSPFv3 Denial of Service Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ospfv3-dos-48qutcu) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-9503, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-9503 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-9503
- **State**: PUBLISHED
- **Published Date**: December 20, 2024 at 06:59 UTC
- **Last Updated**: December 20, 2024 at 19:52 UTC
- **Reserved Date**: October 03, 2024 at 20:53 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Maintenance & Coming Soon Redirect Animation plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'wploti_add_whitelisted_roles_option', 'wploti_remove_whitelisted_roles_option', 'wploti_add_whitelisted_users_option', 'wploti_remove_whitelisted_users_option', and 'wploti_uploaded_animation_save_option' functions in all versions up to, and including, 2.1.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify certain plugin settings.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**yasinedr - Maintenance & Coming Soon Redirect Animation**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/1e716cf9-198c-4a32-883d-3f90dd399aee?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/maintenance-coming-soon-redirect-animation/trunk/wploti_maintenance_redirect.php)
### Credits
- Francesco Carlucci |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-36705, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-36705 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-36705
- **State**: PUBLISHED
- **Published Date**: June 07, 2023 at 12:43 UTC
- **Last Updated**: December 28, 2024 at 00:52 UTC
- **Reserved Date**: June 06, 2023 at 12:41 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Adning Advertising plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the _ning_upload_image function in versions up to, and including, 1.5.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**tunafish - Adning Advertising**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/4a263b74-e9ae-4fd2-be9b-9b8e9eee5982?source=cve)
2. [](https://codecanyon.net/item/wp-pro-advertising-system-all-in-one-ad-manager/269693)
3. [](https://blog.nintechnet.com/critical-vulnerability-in-adning-advertising-plugin-actively-exploited-in-the-wild/)
4. [](https://www.wordfence.com/blog/2020/07/critical-vulnerabilities-patched-in-adning-advertising-plugin/)
5. [](https://wpscan.com/vulnerability/e9873fe3-fc06-4a52-aa32-6922cab7830c)
### Credits
- Jerome Bruandet |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-24062, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-24062 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-24062
- **State**: PUBLISHED
- **Published Date**: August 08, 2024 at 00:00 UTC
- **Last Updated**: March 18, 2025 at 19:01 UTC
- **Reserved Date**: January 23, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Diebold Nixdorf Vynamic Security Suite (VSS) before 3.3.0 SR12, 4.0.0 SR04, 4.1.0 SR02, and 4.2.0 SR01 fails to validate the directory structure of the root file system during the Pre-Boot Authorization (PBA) process. This can be exploited by a physical attacker who is able to manipulate the contents of the system's hard disk.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.dieboldnixdorf.com/en-us/banking/portfolio/software/security/)
2. [](https://media.defcon.org/DEF%20CON%2032/DEF%20CON%2032%20presentations/DEF%20CON%2032%20-%20Matt%20Burch%20-%20Where%E2%80%99s%20the%20Money%20-%20Defeating%20ATM%20Disk%20Encryption-white%20paper.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-0124, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-0124 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-0124
- **State**: PUBLISHED
- **Published Date**: March 03, 2011 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 21:43 UTC
- **Reserved Date**: December 23, 2010 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.apple.com/kb/HT4564)
2. [](http://support.apple.com/kb/HT4566)
3. [oval:org.mitre.oval:def:17280](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17280)
4. [APPLE-SA-2011-03-02-1](http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html)
5. [APPLE-SA-2011-03-09-1](http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html)
6. [](http://support.apple.com/kb/HT4554)
7. [APPLE-SA-2011-03-09-2](http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-0529, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-0529 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-0529
- **State**: PUBLISHED
- **Published Date**: June 08, 2004 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 00:24 UTC
- **Reserved Date**: June 03, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The modified suexec program in cPanel, when configured for mod_php and compiled for Apache 1.3.31 and earlier without mod_phpsuexec, allows local users to execute untrusted shared scripts and gain privileges, as demonstrated using untainted scripts such as (1) proftpdvhosts or (2) addalink.cgi, a different vulnerability than CVE-2004-0490.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1010411](http://securitytracker.com/id?1010411)
2. [20040605 cPanel mod_php suEXEC Taint Vulnerability](http://marc.info/?l=bugtraq&m=108663003608211&w=2)
3. [11798](http://secunia.com/advisories/11798)
4. [](http://bugzilla.cpanel.net/show_bug.cgi?id=668)
5. [10478](http://www.securityfocus.com/bid/10478)
6. [cpanel-suexec-command-execute(16347)](https://exchange.xforce.ibmcloud.com/vulnerabilities/16347) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-15021, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-15021 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-15021
- **State**: PUBLISHED
- **Published Date**: January 17, 2023 at 14:58 UTC
- **Last Updated**: April 04, 2025 at 18:36 UTC
- **Reserved Date**: January 16, 2023 at 14:51 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in nickzren alsdb. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to sql injection. Upgrading to version v2 is able to address this issue. The identifier of the patch is cbc79a68145e845f951113d184b4de207c341599. It is recommended to upgrade the affected component. The identifier VDB-218429 was assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**nickzren - alsdb**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://vuldb.com/?id.218429)
2. [](https://vuldb.com/?ctiid.218429)
3. [](https://github.com/nickzren/alsdb/commit/cbc79a68145e845f951113d184b4de207c341599)
4. [](https://github.com/nickzren/alsdb/releases/tag/v2)
### Credits
- VulDB GitHub Commit Analyzer |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-5044, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-5044 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-5044
- **State**: PUBLISHED
- **Published Date**: November 02, 2011 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 04:09 UTC
- **Reserved Date**: November 02, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in models/log.php in the Search Log (com_searchlog) component 3.1.0 for Joomla! allows remote authenticated users, with Public Back-end privileges, to execute arbitrary SQL commands via the search parameter in a log action to administrator/index.php. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [searchlog-index-sql-injection(59152)](https://exchange.xforce.ibmcloud.com/vulnerabilities/59152)
2. [ADV-2010-1363](http://www.vupen.com/english/advisories/2010/1363)
3. [65185](http://osvdb.org/65185)
4. [40588](http://www.securityfocus.com/bid/40588)
5. [40055](http://secunia.com/advisories/40055)
6. [13746](http://www.exploit-db.com/exploits/13746/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-21852, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-21852 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-21852
- **State**: PUBLISHED
- **Published Date**: March 12, 2025 at 09:42 UTC
- **Last Updated**: May 04, 2025 at 07:22 UTC
- **Reserved Date**: December 29, 2024 at 08:45 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
net: Add rx_skb of kfree_skb to raw_tp_null_args[].
Yan Zhai reported a BPF prog could trigger a null-ptr-deref [0]
in trace_kfree_skb if the prog does not check if rx_sk is NULL.
Commit c53795d48ee8 ("net: add rx_sk to trace_kfree_skb") added
rx_sk to trace_kfree_skb, but rx_sk is optional and could be NULL.
Let's add kfree_skb to raw_tp_null_args[] to let the BPF verifier
validate such a prog and prevent the issue.
Now we fail to load such a prog:
libbpf: prog 'drop': -- BEGIN PROG LOAD LOG --
0: R1=ctx() R10=fp0
; int BPF_PROG(drop, struct sk_buff *skb, void *location, @ kfree_skb_sk_null.bpf.c:21
0: (79) r3 = *(u64 *)(r1 +24)
func 'kfree_skb' arg3 has btf_id 5253 type STRUCT 'sock'
1: R1=ctx() R3_w=trusted_ptr_or_null_sock(id=1)
; bpf_printk("sk: %d, %d\n", sk, sk->__sk_common.skc_family); @ kfree_skb_sk_null.bpf.c:24
1: (69) r4 = *(u16 *)(r3 +16)
R3 invalid mem access 'trusted_ptr_or_null_'
processed 2 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
-- END PROG LOAD LOG --
Note this fix requires commit 838a10bd2ebf ("bpf: Augment raw_tp
arguments with PTR_MAYBE_NULL").
[0]:
BUG: kernel NULL pointer dereference, address: 0000000000000010
PF: supervisor read access in kernel mode
PF: error_code(0x0000) - not-present page
PGD 0 P4D 0
PREEMPT SMP
RIP: 0010:bpf_prog_5e21a6db8fcff1aa_drop+0x10/0x2d
Call Trace:
<TASK>
? __die+0x1f/0x60
? page_fault_oops+0x148/0x420
? search_bpf_extables+0x5b/0x70
? fixup_exception+0x27/0x2c0
? exc_page_fault+0x75/0x170
? asm_exc_page_fault+0x22/0x30
? bpf_prog_5e21a6db8fcff1aa_drop+0x10/0x2d
bpf_trace_run4+0x68/0xd0
? unix_stream_connect+0x1f4/0x6f0
sk_skb_reason_drop+0x90/0x120
unix_stream_connect+0x1f4/0x6f0
__sys_connect+0x7f/0xb0
__x64_sys_connect+0x14/0x20
do_syscall_64+0x47/0xc30
entry_SYSCALL_64_after_hwframe+0x4b/0x53
### Affected Products
**Linux - Linux**
Affected versions:
- c53795d48ee8f385c6a9e394651e7ee914baaeba (Status: affected)
- c53795d48ee8f385c6a9e394651e7ee914baaeba (Status: affected)
- c53795d48ee8f385c6a9e394651e7ee914baaeba (Status: affected)
**Linux - Linux**
Affected versions:
- 6.11 (Status: affected)
- 0 (Status: unaffected)
- 6.12.17 (Status: unaffected)
- 6.13.5 (Status: unaffected)
- 6.14 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/f579afacd0a66971fc8481f30d2d377e230a8342)
2. [](https://git.kernel.org/stable/c/4dba79c1e7aad6620bbb707b6c4459380fd90860)
3. [](https://git.kernel.org/stable/c/5da7e15fb5a12e78de974d8908f348e279922ce9) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-40222, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-40222 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-40222
- **State**: PUBLISHED
- **Published Date**: January 26, 2023 at 21:24 UTC
- **Last Updated**: April 01, 2025 at 14:42 UTC
- **Reserved Date**: October 07, 2022 at 15:50 UTC
- **Assigned By**: talos
### Vulnerability Description
An OS command injection vulnerability exists in the m2m DELETE_FILE cmd functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network request can lead to arbitrary command execution. An attacker can send a network request to trigger this vulnerability.
### Weakness Classification (CWE)
- CWE-78: OS Command Injection
### Affected Products
**Siretta - QUARTZ-GOLD**
Affected versions:
- G5.0.1.5-210720-141020 (Status: affected)
### References
1. [https://talosintelligence.com/vulnerability_reports/TALOS-2022-1638](https://talosintelligence.com/vulnerability_reports/TALOS-2022-1638) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-2541, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-2541 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-2541
- **State**: PUBLISHED
- **Published Date**: May 09, 2007 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 13:42 UTC
- **Reserved Date**: May 08, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP remote file inclusion vulnerability in includes/ajax_listado.php in Versado CMS 1.07 allows remote attackers to execute arbitrary PHP code via a URL in the urlModulo parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [25103](http://secunia.com/advisories/25103)
2. [23815](http://www.securityfocus.com/bid/23815)
3. [35772](http://osvdb.org/35772)
4. [3847](https://www.exploit-db.com/exploits/3847)
5. [versado-ajaxlistado-file-include(34072)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34072)
6. [ADV-2007-1666](http://www.vupen.com/english/advisories/2007/1666) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-15065, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-15065 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-15065
- **State**: PUBLISHED
- **Published Date**: August 07, 2020 at 21:27 UTC
- **Last Updated**: August 04, 2024 at 13:08 UTC
- **Reserved Date**: June 25, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
DIGITUS DA-70254 4-Port Gigabit Network Hub 2.073.000.E0008 devices allow an attacker on the same network to denial-of-service the device via long input values.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://research.hisolutions.com/2020/05/critical-vulnerabilites-in-multiple-usb-network-servers/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-35322, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-35322 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-35322
- **State**: REJECTED
- **Published Date**: July 11, 2022 at 19:31 UTC
- **Last Updated**: July 11, 2022 at 19:31 UTC
- **Reserved Date**: July 07, 2022 at 00:00 UTC
- **Assigned By**: sap
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-6387, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-6387 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-6387
- **State**: PUBLISHED
- **Published Date**: January 29, 2018 at 18:00 UTC
- **Last Updated**: September 16, 2024 at 16:43 UTC
- **Reserved Date**: January 29, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
iBall iB-WRA150N 1.2.6 build 110401 Rel.47776n devices have a hardcoded password of admin for the admin account, a hardcoded password of support for the support account, and a hardcoded password of user for the user account.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://blogs.securiteam.com/index.php/archives/3654) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-3796, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-3796 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-3796
- **State**: PUBLISHED
- **Published Date**: April 18, 2025 at 21:00 UTC
- **Last Updated**: April 21, 2025 at 14:26 UTC
- **Reserved Date**: April 18, 2025 at 14:03 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical has been found in PHPGurukul Men Salon Management System 1.0. This affects an unknown part of the file /admin/contact-us.php. The manipulation of the argument pagetitle/pagedes/email/mobnumber/timing leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**PHPGurukul - Men Salon Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-305649 | PHPGurukul Men Salon Management System contact-us.php sql injection](https://vuldb.com/?id.305649)
2. [VDB-305649 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.305649)
3. [Submit #554659 | phpgurukul Men-Salon-Management-System V1.0 SQL Injection](https://vuldb.com/?submit.554659)
4. [](https://github.com/yaklang/IRifyScanResult/blob/main/Men-Salon-Management-System/sql_inject_in_contact_us.md)
5. [](https://phpgurukul.com/)
### Credits
- 1098024193 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-48612, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-48612 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-48612
- **State**: PUBLISHED
- **Published Date**: October 16, 2023 at 00:00 UTC
- **Last Updated**: September 16, 2024 at 18:55 UTC
- **Reserved Date**: October 15, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A Universal Cross Site Scripting (UXSS) vulnerability in ClassLink OneClick Extension through 10.7 allows remote attackers to inject JavaScript into any webpage, because a regular expression (validating whether a URL is controlled by ClassLink) is not present in all applicable places.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://blog.zerdle.net/classlink/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-40981, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-40981 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-40981
- **State**: PUBLISHED
- **Published Date**: September 27, 2021 at 05:43 UTC
- **Last Updated**: August 04, 2024 at 02:59 UTC
- **Reserved Date**: September 13, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ASUS ROG Armoury Crate Lite before 4.2.10 allows local users to gain privileges by placing a Trojan horse file in the publicly writable %PROGRAMDATA%\ASUS\GamingCenterLib directory.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://aptw.tf/2021/09/24/armoury-crate-privesc.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-27445, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-27445 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-27445
- **State**: PUBLISHED
- **Published Date**: December 21, 2021 at 17:54 UTC
- **Last Updated**: September 17, 2024 at 00:51 UTC
- **Reserved Date**: February 19, 2021 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
Mesa Labs AmegaView Versions 3.0 and prior has insecure file permissions that could be exploited to escalate privileges on the device.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-269: Security Weakness
### Affected Products
**Mesa Labs - AmegaView**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://us-cert.cisa.gov/ics/advisories/icsa-21-147-03)
### Credits
- Stephen Yackey of Securifera reported these vulnerabilities to CISA. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-12633, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-12633 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-12633
- **State**: PUBLISHED
- **Published Date**: September 05, 2019 at 01:15 UTC
- **Last Updated**: November 19, 2024 at 18:57 UTC
- **Reserved Date**: June 04, 2019 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in Cisco Unified Contact Center Express (Unified CCX) could allow an unauthenticated, remote attacker to bypass access controls and conduct a server-side request forgery (SSRF) attack on a targeted system. The vulnerability is due to improper validation of user-supplied input on the affected system. An attacker could exploit this vulnerability by sending the user of the web application a crafted request. If the request is processed, the attacker could access the system and perform unauthorized actions.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**Cisco - Cisco Unified Contact Center Express**
Affected versions:
- unspecified (Status: affected)
### References
1. [20190904 Cisco Unified Contact Center Express Request Processing Server-Side Request Forgery Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190904-unified-ccx-ssrf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-5689, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-5689 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-5689
- **State**: PUBLISHED
- **Published Date**: January 25, 2013 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 21:14 UTC
- **Reserved Date**: October 29, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ISC BIND 9.8.x through 9.8.4-P1 and 9.9.x through 9.9.2-P1, in certain configurations involving DNS64 with a Response Policy Zone that lacks an AAAA rewrite rule, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for an AAAA record.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.isc.org/article/AA-00855/)
2. [](http://www.isc.org/software/bind/advisories/cve-2012-5689)
3. [USN-2693-1](http://www.ubuntu.com/usn/USN-2693-1)
4. [RHSA-2013:0550](http://rhn.redhat.com/errata/RHSA-2013-0550.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-5284, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-5284 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-5284
- **State**: REJECTED
- **Published Date**: October 09, 2007 at 00:00 UTC
- **Last Updated**: October 11, 2007 at 09:00 UTC
- **Reserved Date**: October 08, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-50113, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-50113 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-50113
- **State**: PUBLISHED
- **Published Date**: November 05, 2024 at 17:10 UTC
- **Last Updated**: May 04, 2025 at 09:46 UTC
- **Reserved Date**: October 21, 2024 at 19:36 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
firewire: core: fix invalid port index for parent device
In a commit 24b7f8e5cd65 ("firewire: core: use helper functions for self
ID sequence"), the enumeration over self ID sequence was refactored with
some helper functions with KUnit tests. These helper functions are
guaranteed to work expectedly by the KUnit tests, however their application
includes a mistake to assign invalid value to the index of port connected
to parent device.
This bug affects the case that any extra node devices which has three or
more ports are connected to 1394 OHCI controller. In the case, the path
to update the tree cache could hits WARN_ON(), and gets general protection
fault due to the access to invalid address computed by the invalid value.
This commit fixes the bug to assign correct port index.
### Affected Products
**Linux - Linux**
Affected versions:
- 24b7f8e5cd656196a13077e160aec45ad89b58d9 (Status: affected)
- 24b7f8e5cd656196a13077e160aec45ad89b58d9 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.11 (Status: affected)
- 0 (Status: unaffected)
- 6.11.6 (Status: unaffected)
- 6.12 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/90753a38bc3d058820981f812a908a99f7b337c1)
2. [](https://git.kernel.org/stable/c/f6a6780e0b9bbcf311a727afed06fee533a5e957) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-25478, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-25478 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-25478
- **State**: PUBLISHED
- **Published Date**: October 06, 2021 at 17:09 UTC
- **Last Updated**: August 03, 2024 at 20:03 UTC
- **Reserved Date**: January 19, 2021 at 00:00 UTC
- **Assigned By**: Samsung Mobile
### Vulnerability Description
A possible stack-based buffer overflow vulnerability in Exynos CP Chipset prior to SMR Oct-2021 Release 1 allows arbitrary memory write and code execution.
### CVSS Metrics
- **CVSS Base Score**: 7.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**Samsung Mobile - Samsung Mobile Devices**
Affected versions:
- O(8.1), P(9.0), Q(10.0), R(11.0) (Status: affected)
### References
1. [](https://security.samsungmobile.com/securityUpdate.smsb?year=2021&month=10) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-5011, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-5011 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-5011
- **State**: PUBLISHED
- **Published Date**: January 10, 2014 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 16:59 UTC
- **Reserved Date**: July 29, 2013 at 00:00 UTC
- **Assigned By**: symantec
### Vulnerability Description
Unquoted Windows search path vulnerability in the client in Symantec Endpoint Protection (SEP) 11.x before 11.0.7.4 and 12.x before 12.1.2 RU2 and Endpoint Protection Small Business Edition 12.x before 12.1.2 RU2 allows local users to gain privileges via a crafted program in the %SYSTEMDRIVE% directory.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [64130](http://www.securityfocus.com/bid/64130)
2. [](http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20140109_00)
3. [symantec-endpoint-cve20135011-priv-esc(90226)](https://exchange.xforce.ibmcloud.com/vulnerabilities/90226) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-20380, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-20380 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-20380
- **State**: PUBLISHED
- **Published Date**: June 03, 2021 at 14:45 UTC
- **Last Updated**: September 16, 2024 at 16:39 UTC
- **Reserved Date**: December 17, 2020 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM QRadar Advisor With Watson App 1.1 through 2.5 as used on IBM QRadar SIEM 7.4 could allow a remote user to obtain sensitive information from HTTP requests that could aid in further attacks against the system. IBM X-Force ID: 195712.
### Affected Products
**IBM - Qradar Advisor**
Affected versions:
- 1.1 (Status: affected)
- 2.5 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6457941)
2. [ibm-qradar-cve202120380-info-disc (195712)](https://exchange.xforce.ibmcloud.com/vulnerabilities/195712) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-1133, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-1133 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-1133
- **State**: PUBLISHED
- **Published Date**: February 20, 2024 at 18:56 UTC
- **Last Updated**: August 01, 2024 at 18:26 UTC
- **Reserved Date**: January 31, 2024 at 17:33 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to unauthorized access of restricted Q&A content due to a missing capability check when interacting with questions in all versions up to, and including, 2.6.0. This makes it possible for authenticated attackers, with subscriber access or higher, to interact with questions in courses in which they are not enrolled including private courses.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N`
### Affected Products
**themeum - Tutor LMS – eLearning and online course solution**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/e8a7c04a-1fa0-434d-8161-7a32cefb44c4?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3037911%40tutor%2Ftrunk&old=3020286%40tutor%2Ftrunk&sfp_email=&sfph_mail=#file12)
### Credits
- Pedro Paniago |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-0171, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-0171 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-0171
- **State**: PUBLISHED
- **Published Date**: April 10, 2012 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 18:16 UTC
- **Reserved Date**: December 13, 2011 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Internet Explorer 6 through 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "SelectAll Remote Code Execution Vulnerability."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [MS12-023](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-023)
2. [1026901](http://www.securitytracker.com/id?1026901)
3. [TA12-101A](http://www.us-cert.gov/cas/techalerts/TA12-101A.html)
4. [ms-ie-selectall-code-exec(74382)](https://exchange.xforce.ibmcloud.com/vulnerabilities/74382)
5. [oval:org.mitre.oval:def:15313](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15313) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1442, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1442 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1442
- **State**: PUBLISHED
- **Published Date**: March 08, 2018 at 16:00 UTC
- **Last Updated**: September 17, 2024 at 00:31 UTC
- **Reserved Date**: December 13, 2017 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Application Performance Management - Response Time Monitoring Agent (IBM Monitoring 8.1.4) is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 139598.
### Affected Products
**IBM - Monitoring**
Affected versions:
- 8.1.4 (Status: affected)
### References
1. [103368](http://www.securityfocus.com/bid/103368)
2. [ibm-itcam-cve20181442-csrf(139598)](https://exchange.xforce.ibmcloud.com/vulnerabilities/139598)
3. [](http://www.ibm.com/support/docview.wss?uid=swg22013500) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-4053, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-4053 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-4053
- **State**: PUBLISHED
- **Published Date**: May 26, 2025 at 10:03 UTC
- **Last Updated**: May 27, 2025 at 14:23 UTC
- **Reserved Date**: April 28, 2025 at 21:08 UTC
- **Assigned By**: CERT-PL
### Vulnerability Description
The data stored in Be-Tech Mifare Classic card is stored in cleartext. An attacker having access to a Be-Tech hotel guest Mifare Classic card can create a master key card that unlocks all the locks in the building.
This issue affects all Be-Tech Mifare Classic card systems. To fix the vulnerability, it is necessary to replace the software, encoder, cards, and PCBs in the locks.
### Weakness Classification (CWE)
- CWE-312: Security Weakness
### Affected Products
**Be-Tech - Mifare Classic cards**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://cert.pl/en/posts/2025/05/CVE-2025-4053/)
### Credits
- Sławomir Jasek, smartlockpicking.com |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-20213, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-20213 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-20213
- **State**: PUBLISHED
- **Published Date**: December 18, 2018 at 19:00 UTC
- **Last Updated**: September 16, 2024 at 21:07 UTC
- **Reserved Date**: December 18, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
wbook_addworksheet in workbook.c in libexcel.a in libexcel 0.01 allows attackers to cause a denial of service (SEGV) via a long name. NOTE: this is not a Microsoft product.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/devinsmith/libexcel/issues/8) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-17058, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-17058 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-17058
- **State**: PUBLISHED
- **Published Date**: November 11, 2020 at 06:48 UTC
- **Last Updated**: September 10, 2024 at 15:51 UTC
- **Reserved Date**: August 04, 2020 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Browser Memory Corruption Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C`
### Affected Products
**Microsoft - Internet Explorer 11**
Affected versions:
- 1.0.0 (Status: affected)
**Microsoft - Microsoft Edge (EdgeHTML-based)**
Affected versions:
- 1.0..0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17058) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-18342, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-18342 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-18342
- **State**: PUBLISHED
- **Published Date**: June 27, 2018 at 12:00 UTC
- **Last Updated**: August 05, 2024 at 21:20 UTC
- **Reserved Date**: June 27, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the 'UnsafeLoader' has been introduced for backward compatibility with the function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/yaml/pyyaml/pull/74)
2. [](https://github.com/yaml/pyyaml/blob/master/CHANGES)
3. [FEDORA-2019-bed9afe622](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M6JCFGEIEOFMWWIXGHSELMKQDD4CV2BA/)
4. [FEDORA-2019-779a9db46a](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSQQMRUQSXBSUXLCRD3TSZYQ7SEZRKCE/)
5. [FEDORA-2019-44643e8bcb](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JEX7IPV5P2QJITAMA5Z63GQCZA5I6NVZ/)
6. [](https://github.com/marshmallow-code/apispec/issues/278)
7. [](https://github.com/yaml/pyyaml/issues/193)
8. [](https://github.com/yaml/pyyaml/wiki/PyYAML-yaml.load%28input%29-Deprecation)
9. [GLSA-202003-45](https://security.gentoo.org/glsa/202003-45) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-30471, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-30471 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-30471
- **State**: PUBLISHED
- **Published Date**: September 27, 2023 at 07:57 UTC
- **Last Updated**: February 19, 2025 at 21:23 UTC
- **Reserved Date**: April 11, 2023 at 14:13 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Cornel Raiu WP Search Analytics plugin <= 1.4.7 versions.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Cornel Raiu - WP Search Analytics**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/search-analytics/wordpress-wp-search-analytics-plugin-1-4-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- LEE SE HYOUNG (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-13921, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-13921 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-13921
- **State**: PUBLISHED
- **Published Date**: October 10, 2019 at 13:49 UTC
- **Last Updated**: August 05, 2024 at 00:05 UTC
- **Reserved Date**: July 18, 2019 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in SIMATIC WinAC RTX (F) 2010 (All versions < SP3 Update 1). Affected versions of the software contain a vulnerability that could allow an unauthenticated attacker to trigger a denial-of-service condition. The vulnerability can be triggered if a large HTTP request is sent to the executing service. The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise availability of the service provided by the software.
### Weakness Classification (CWE)
- CWE-410: Security Weakness
### Affected Products
**Siemens AG - SIMATIC WinAC RTX (F) 2010**
Affected versions:
- All versions < SP3 Update 1 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-878278.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-3330, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-3330 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-3330
- **State**: PUBLISHED
- **Published Date**: July 16, 2020 at 17:20 UTC
- **Last Updated**: November 15, 2024 at 16:55 UTC
- **Reserved Date**: December 12, 2019 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the Telnet service of Cisco Small Business RV110W Wireless-N VPN Firewall Routers could allow an unauthenticated, remote attacker to take full control of the device with a high-privileged account. The vulnerability exists because a system account has a default and static password. An attacker could exploit this vulnerability by using this default account to connect to the affected system. A successful exploit could allow the attacker to gain full control of an affected device.
### Weakness Classification (CWE)
- CWE-798: Cross-site Scripting (XSS)
### Affected Products
**Cisco - Cisco RV110W Wireless-N VPN Firewall Firmware**
Affected versions:
- n/a (Status: affected)
### References
1. [20200715 Cisco Small Business RV110W Wireless-N VPN Firewall Static Default Credential Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv110w-static-cred-BMTWBWTy) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-2372, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-2372 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-2372
- **State**: PUBLISHED
- **Published Date**: January 06, 2017 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 23:24 UTC
- **Reserved Date**: February 12, 2016 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
An information leak exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could potentially result in an out-of-bounds read. A malicious user, server, or man-in-the-middle attacker can send an invalid size for a file transfer which will trigger an out-of-bounds read vulnerability. This could result in a denial of service or copy data from memory to the file, resulting in an information leak if the file is sent to another user.
### Affected Products
**Pidgin - Pidgin**
Affected versions:
- 2.10.11 (Status: affected)
### References
1. [91335](http://www.securityfocus.com/bid/91335)
2. [DSA-3620](http://www.debian.org/security/2016/dsa-3620)
3. [](http://www.talosintelligence.com/reports/TALOS-2016-0140/)
4. [GLSA-201701-38](https://security.gentoo.org/glsa/201701-38)
5. [USN-3031-1](http://www.ubuntu.com/usn/USN-3031-1)
6. [](http://www.pidgin.im/news/security/?id=105) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-35389, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-35389 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-35389
- **State**: PUBLISHED
- **Published Date**: August 08, 2023 at 17:08 UTC
- **Last Updated**: February 27, 2025 at 21:07 UTC
- **Reserved Date**: June 14, 2023 at 23:09 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-611: Security Weakness
### Affected Products
**Microsoft - Microsoft Dynamics 365 (on-premises) version 9.0**
Affected versions:
- 9.0.0 (Status: affected)
### References
1. [Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35389) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-46156, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-46156 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-46156
- **State**: PUBLISHED
- **Published Date**: February 09, 2022 at 15:17 UTC
- **Last Updated**: August 04, 2024 at 05:02 UTC
- **Reserved Date**: January 07, 2022 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in Simcenter Femap V2020.2 (All versions), Simcenter Femap V2021.1 (All versions). Affected application contains an out of bounds write past the end of an allocated structure while parsing specially crafted NEU files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-14684)
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Siemens - Simcenter Femap V2020.2**
Affected versions:
- All versions (Status: affected)
**Siemens - Simcenter Femap V2021.1**
Affected versions:
- All versions (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-609880.pdf)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-22-309/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-29301, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-29301 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-29301
- **State**: REJECTED
- **Published Date**: June 22, 2022 at 18:11 UTC
- **Last Updated**: June 22, 2022 at 18:11 UTC
- **Reserved Date**: April 16, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-12698, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-12698 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-12698
- **State**: PUBLISHED
- **Published Date**: June 23, 2018 at 22:00 UTC
- **Last Updated**: August 05, 2024 at 08:45 UTC
- **Reserved Date**: June 23, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
demangle_template in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM) during the "Create an array for saving the template argument values" XNEWVEC call. This can occur during execution of objdump.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102)
2. [](https://sourceware.org/bugzilla/show_bug.cgi?id=23057)
3. [](https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454)
4. [104539](http://www.securityfocus.com/bid/104539)
5. [GLSA-201908-01](https://security.gentoo.org/glsa/201908-01)
6. [USN-4326-1](https://usn.ubuntu.com/4326-1/)
7. [USN-4336-1](https://usn.ubuntu.com/4336-1/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-4311, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-4311 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-4311
- **State**: PUBLISHED
- **Published Date**: December 10, 2008 at 00:00 UTC
- **Last Updated**: August 07, 2024 at 10:08 UTC
- **Reserved Date**: September 29, 2008 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
The default configuration of system.conf in D-Bus (aka DBus) before 1.2.6 omits the send_type attribute in certain rules, which allows local users to bypass intended access restrictions by (1) sending messages, related to send_requested_reply; and possibly (2) receiving messages, related to receive_requested_reply.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugs.freedesktop.org/show_bug.cgi?id=18229)
2. [33047](http://secunia.com/advisories/33047)
3. [openSUSE-SU-2012:1418](http://lists.opensuse.org/opensuse-updates/2012-10/msg00094.html)
4. [dbus-sendreceive-security-bypass(47138)](https://exchange.xforce.ibmcloud.com/vulnerabilities/47138)
5. [34642](http://secunia.com/advisories/34642)
6. [](https://bugzilla.redhat.com/show_bug.cgi?id=474895)
7. [ADV-2008-3355](http://www.vupen.com/english/advisories/2008/3355)
8. [SUSE-SR:2009:008](http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html)
9. [FEDORA-2008-10907](https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00436.html)
10. [33055](http://secunia.com/advisories/33055)
11. [](http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=503532)
12. [](http://forums.fedoraforum.org/showthread.php?t=206797)
13. [34360](http://secunia.com/advisories/34360)
14. [[dbus] 20081205 [CVE-2008-4311] DBus 1.2.6](http://lists.freedesktop.org/archives/dbus/2008-December/010702.html)
15. [SUSE-SR:2009:009](http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html)
16. [32674](http://www.securityfocus.com/bid/32674)
17. [SUSE-SA:2009:013](http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00003.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-0742, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-0742 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-0742
- **State**: PUBLISHED
- **Published Date**: September 19, 2003 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 02:05 UTC
- **Reserved Date**: September 03, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SCO Internet Manager (mana) allows local users to execute arbitrary programs by setting the REMOTE_ADDR environment variable to cause menu.mana to run as if it were called from ncsa_httpd, then modifying the PATH environment variable to point to a malicious "hostname" program.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2003-0742) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-1271, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-1271 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-1271
- **State**: PUBLISHED
- **Published Date**: April 08, 2009 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 05:04 UTC
- **Reserved Date**: April 08, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The JSON_parser function (ext/json/JSON_parser.c) in PHP 5.2.x before 5.2.9 allows remote attackers to cause a denial of service (segmentation fault) via a malformed string to the json_decode API function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20090401 CVE request: PHP 5.2.9](http://www.openwall.com/lists/oss-security/2009/04/01/9)
2. [DSA-1775](http://www.debian.org/security/2009/dsa-1775)
3. [FEDORA-2009-3768](https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01451.html)
4. [](http://cvs.php.net/viewvc.cgi/php-src/ext/json/JSON_parser.c?r1=1.1.2.14&r2=1.1.2.15)
5. [34770](http://secunia.com/advisories/34770)
6. [APPLE-SA-2009-09-10-2](http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html)
7. [](http://www.php.net/releases/5_2_9.php)
8. [35007](http://secunia.com/advisories/35007)
9. [34933](http://secunia.com/advisories/34933)
10. [34830](http://secunia.com/advisories/34830)
11. [USN-761-2](http://www.ubuntu.com/usn/USN-761-2)
12. [RHSA-2009:0350](http://www.redhat.com/support/errata/RHSA-2009-0350.html)
13. [FEDORA-2009-3848](https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01465.html)
14. [35003](http://secunia.com/advisories/35003)
15. [35685](http://secunia.com/advisories/35685)
16. [SUSE-SR:2009:012](http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html)
17. [](http://support.apple.com/kb/HT3865)
18. [36701](http://secunia.com/advisories/36701)
19. [MDVSA-2009:090](http://www.mandriva.com/security/advisories?name=MDVSA-2009:090)
20. [35306](http://secunia.com/advisories/35306)
21. [USN-761-1](https://usn.ubuntu.com/761-1/)
22. [DSA-1789](http://www.debian.org/security/2009/dsa-1789) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-31400, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-31400 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-31400
- **State**: PUBLISHED
- **Published Date**: June 11, 2024 at 04:26 UTC
- **Last Updated**: November 08, 2024 at 21:24 UTC
- **Reserved Date**: April 03, 2024 at 09:14 UTC
- **Assigned By**: jpcert
### Vulnerability Description
Insertion of sensitive information into sent data issue exists in Cybozu Garoon 5.0.0 to 5.15.0. If this vulnerability is exploited, unintended data may be left in forwarded mail.
### Affected Products
**Cybozu, Inc. - Cybozu Garoon**
Affected versions:
- 5.0.0 to 5.15.0 (Status: affected)
### References
1. [](https://cs.cybozu.co.jp/2024/007901.html)
2. [](https://jvn.jp/en/jp/JVN28869536/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-2884, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-2884 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-2884
- **State**: PUBLISHED
- **Published Date**: June 10, 2025 at 17:29 UTC
- **Last Updated**: June 10, 2025 at 19:02 UTC
- **Reserved Date**: March 27, 2025 at 21:01 UTC
- **Assigned By**: certcc
### Vulnerability Description
TCG TPM2.0 Reference implementation's CryptHmacSign helper function is vulnerable to Out-of-Bounds read due to the lack of validation the signature scheme with the signature key's algorithm. See Errata 1.83 of TCG standard TPM2.0
### Affected Products
**Trusted Computing Group - TPM2.0**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://trustedcomputinggroup.org/about/security/)
2. [](https://trustedcomputinggroup.org/wp-content/uploads/TPM2.0-Library-Spec-v1.83-Errata_v1_pub.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-49900, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-49900 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-49900
- **State**: PUBLISHED
- **Published Date**: May 01, 2025 at 14:10 UTC
- **Last Updated**: May 04, 2025 at 08:48 UTC
- **Reserved Date**: May 01, 2025 at 14:05 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
i2c: piix4: Fix adapter not be removed in piix4_remove()
In piix4_probe(), the piix4 adapter will be registered in:
piix4_probe()
piix4_add_adapters_sb800() / piix4_add_adapter()
i2c_add_adapter()
Based on the probed device type, piix4_add_adapters_sb800() or single
piix4_add_adapter() will be called.
For the former case, piix4_adapter_count is set as the number of adapters,
while for antoher case it is not set and kept default *zero*.
When piix4 is removed, piix4_remove() removes the adapters added in
piix4_probe(), basing on the piix4_adapter_count value.
Because the count is zero for the single adapter case, the adapter won't
be removed and makes the sources allocated for adapter leaked, such as
the i2c client and device.
These sources can still be accessed by i2c or bus and cause problems.
An easily reproduced case is that if a new adapter is registered, i2c
will get the leaked adapter and try to call smbus_algorithm, which was
already freed:
Triggered by: rmmod i2c_piix4 && modprobe max31730
BUG: unable to handle page fault for address: ffffffffc053d860
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
Oops: 0000 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 3752 Comm: modprobe Tainted: G
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)
RIP: 0010:i2c_default_probe (drivers/i2c/i2c-core-base.c:2259) i2c_core
RSP: 0018:ffff888107477710 EFLAGS: 00000246
...
<TASK>
i2c_detect (drivers/i2c/i2c-core-base.c:2302) i2c_core
__process_new_driver (drivers/i2c/i2c-core-base.c:1336) i2c_core
bus_for_each_dev (drivers/base/bus.c:301)
i2c_for_each_dev (drivers/i2c/i2c-core-base.c:1823) i2c_core
i2c_register_driver (drivers/i2c/i2c-core-base.c:1861) i2c_core
do_one_initcall (init/main.c:1296)
do_init_module (kernel/module/main.c:2455)
...
</TASK>
---[ end trace 0000000000000000 ]---
Fix this problem by correctly set piix4_adapter_count as 1 for the
single adapter so it can be normally removed.
### Affected Products
**Linux - Linux**
Affected versions:
- 528d53a1592b0e27c423f7cafc1df85f77fc1163 (Status: affected)
- 528d53a1592b0e27c423f7cafc1df85f77fc1163 (Status: affected)
- 528d53a1592b0e27c423f7cafc1df85f77fc1163 (Status: affected)
- 528d53a1592b0e27c423f7cafc1df85f77fc1163 (Status: affected)
**Linux - Linux**
Affected versions:
- 5.4 (Status: affected)
- 0 (Status: unaffected)
- 5.10.154 (Status: unaffected)
- 5.15.78 (Status: unaffected)
- 6.0.8 (Status: unaffected)
- 6.1 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/bfd5e62f9a7ee214661cb6f143a3b40ccc63317f)
2. [](https://git.kernel.org/stable/c/d78ccdce662e88f41e87e90cf2bee63c1715d2a5)
3. [](https://git.kernel.org/stable/c/fe51636fffc8108c7c4da6aa393010e786530ad9)
4. [](https://git.kernel.org/stable/c/569bea74c94d37785682b11bab76f557520477cd) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-1595, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-1595 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-1595
- **State**: PUBLISHED
- **Published Date**: July 08, 2021 at 18:35 UTC
- **Last Updated**: November 07, 2024 at 22:07 UTC
- **Reserved Date**: November 13, 2020 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
Multiple vulnerabilities in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Video Surveillance 7000 Series IP Cameras could allow an unauthenticated, adjacent attacker to cause a memory leak, which could lead to a denial of service (DoS) condition on an affected device. These vulnerabilities are due to incorrect processing of certain LLDP packets at ingress time. An attacker could exploit these vulnerabilities by sending crafted LLDP packets to an affected device. A successful exploit could allow the attacker to cause the affected device to continuously consume memory, which could cause the device to crash and reload, resulting in a DoS condition. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-401: Security Weakness
### Affected Products
**Cisco - Cisco Video Surveillance 7000 Series IP Cameras**
Affected versions:
- n/a (Status: affected)
### References
1. [20210707 Cisco Video Surveillance 7000 Series IP Cameras Link Layer Discovery Protocol Memory Leak Vulnerabilities](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipcamera-lldp-mem-wGqundTq) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-4589, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-4589 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-4589
- **State**: PUBLISHED
- **Published Date**: January 07, 2010 at 18:13 UTC
- **Last Updated**: August 07, 2024 at 07:08 UTC
- **Reserved Date**: January 07, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the Special:Block implementation in the getContribsLink function in SpecialBlockip.php in MediaWiki 1.14.0 and 1.15.0 allows remote attackers to inject arbitrary web script or HTML via the ip parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [35662](http://www.securityfocus.com/bid/35662)
2. [55824](http://osvdb.org/55824)
3. [35818](http://secunia.com/advisories/35818)
4. [](https://bugzilla.wikimedia.org/show_bug.cgi?id=19693)
5. [ADV-2009-1882](http://www.vupen.com/english/advisories/2009/1882)
6. [mediawiki-specialblocks-xss(51687)](https://exchange.xforce.ibmcloud.com/vulnerabilities/51687)
7. [[mediawiki-announce] 20090713 MediaWiki security update: 1.15.1 and 1.14.1](http://lists.wikimedia.org/pipermail/mediawiki-announce/2009-July/000087.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-17160, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-17160 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-17160
- **State**: PUBLISHED
- **Published Date**: December 04, 2018 at 21:00 UTC
- **Last Updated**: August 05, 2024 at 10:39 UTC
- **Reserved Date**: September 18, 2018 at 00:00 UTC
- **Assigned By**: freebsd
### Vulnerability Description
In FreeBSD before 11.2-STABLE(r341486) and 11.2-RELEASE-p6, insufficient bounds checking in one of the device models provided by bhyve can permit a guest operating system to overwrite memory in the bhyve host possibly permitting arbitrary code execution. A guest OS using a firmware image can cause the bhyve process to crash, or possibly execute arbitrary code on the host as root.
### Affected Products
**FreeBSD - FreeBSD**
Affected versions:
- FreeBSD 11.2 before 11.2-RELEASE-p6 (Status: affected)
### References
1. [FreeBSD-SA-18:14](https://security.freebsd.org/advisories/FreeBSD-SA-18:14.bhyve.asc)
2. [106210](http://www.securityfocus.com/bid/106210) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-36210, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-36210 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-36210
- **State**: PUBLISHED
- **Published Date**: January 22, 2021 at 09:05 UTC
- **Last Updated**: August 04, 2024 at 17:23 UTC
- **Reserved Date**: January 22, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the autorand crate before 0.2.3 for Rust. Because of impl Random on arrays, uninitialized memory can be dropped when a panic occurs, leading to memory corruption.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://rustsec.org/advisories/RUSTSEC-2020-0103.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-13967, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-13967 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13967
- **State**: PUBLISHED
- **Published Date**: June 04, 2025 at 08:01 UTC
- **Last Updated**: June 04, 2025 at 13:28 UTC
- **Reserved Date**: June 04, 2025 at 07:03 UTC
- **Assigned By**: ABB
### Vulnerability Description
This vulnerability allows the successful attacker to gain unauthorized access to a
configuration web page delivered by the integrated web Server of EIBPORT.
This issue affects EIBPORT V3 KNX: through 3.9.8; EIBPORT V3 KNX GSM: through 3.9.8.
### CVSS Metrics
- **CVSS Base Score**: 8.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-384: Security Weakness
### Affected Products
**ABB - EIBPORT V3 KNX**
Affected versions:
- 0 (Status: affected)
**ABB - EIBPORT V3 KNX GSM**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://search.abb.com/library/Download.aspx?DocumentID=9AKK108471A1621&LanguageCode=en&DocumentPartId=pdf&Action=Launch)
### Credits
- Psytester for describing the findings and helping to verify the resolving implementation
- Frank van den Hurk for working with us to help protect customers |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-24577, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-24577 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-24577
- **State**: PUBLISHED
- **Published Date**: March 13, 2023 at 00:00 UTC
- **Last Updated**: March 03, 2025 at 20:10 UTC
- **Reserved Date**: January 27, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
McAfee Total Protection prior to 16.0.50 allows attackers to elevate user privileges due to Improper Link Resolution via registry keys. This could enable a user with lower privileges to execute unauthorized tasks.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.mcafee.com/en-us/consumer-corporate/mcafee-labs/product-security-bulletins.html)
2. [](https://www.mcafee.com/support/?articleId=TS103397&page=shell&shell=article-view) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-0431, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-0431 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-0431
- **State**: PUBLISHED
- **Published Date**: February 18, 2011 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 21:51 UTC
- **Reserved Date**: January 12, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The afs_linux_lock function in afs/LINUX/osi_vnodeops.c in the kernel module in OpenAFS 1.4.14, 1.4.12, 1.4.7, and possibly other versions does not properly handle errors, which allows attackers to cause a denial of service via unknown vectors. NOTE: some of these details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [46428](http://www.securityfocus.com/bid/46428)
2. [DSA-2168](http://www.debian.org/security/2011/dsa-2168)
3. [ADV-2011-0410](http://www.vupen.com/english/advisories/2011/0410)
4. [43371](http://secunia.com/advisories/43371)
5. [1025095](http://www.securitytracker.com/id?1025095)
6. [ADV-2011-0411](http://www.vupen.com/english/advisories/2011/0411)
7. [43407](http://secunia.com/advisories/43407) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-2962, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-2962 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2962
- **State**: PUBLISHED
- **Published Date**: May 29, 2023 at 14:00 UTC
- **Last Updated**: August 02, 2024 at 06:41 UTC
- **Reserved Date**: May 29, 2023 at 13:27 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability, which was classified as critical, has been found in SourceCodester Faculty Evaluation System 1.0. Affected by this issue is some unknown functionality of the file index.php?page=edit_user. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-230150 is the identifier assigned to this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 4.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**SourceCodester - Faculty Evaluation System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://vuldb.com/?id.230150)
2. [](https://vuldb.com/?ctiid.230150)
3. [](https://github.com/JinYunlei/bug_report/blob/main/vendors/oretnom23/faculty-evaluation-system/SQLi-1.md)
### Credits
- JinYunlei (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6840, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6840 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6840
- **State**: PUBLISHED
- **Published Date**: September 30, 2014 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 12:31 UTC
- **Reserved Date**: September 19, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The My Wedding Planner (aka app.wedding) application 1.5 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
2. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing)
3. [VU#541929](http://www.kb.cert.org/vuls/id/541929) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-40737, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-40737 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-40737
- **State**: PUBLISHED
- **Published Date**: September 15, 2022 at 03:22 UTC
- **Last Updated**: August 03, 2024 at 12:28 UTC
- **Reserved Date**: September 15, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Bento4 through 1.6.0-639. A buffer over-read exists in the function AP4_StdcFileByteStream::WritePartial located in System/StdC/Ap4StdCFileByteStream.cpp, called from AP4_ByteStream::Write and AP4_HdlrAtom::WriteFields.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/axiomatic-systems/Bento4/issues/756) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-25506, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-25506 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-25506
- **State**: PUBLISHED
- **Published Date**: March 28, 2024 at 00:00 UTC
- **Last Updated**: August 01, 2024 at 23:44 UTC
- **Reserved Date**: February 07, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross Site Scripting vulnerability in Process Maker, Inc ProcessMaker before 4.0 allows a remote attacker to run arbitrary code via control of the pm_sys_sys cookie.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://medium.com/%40proflamyt/cve-2024-25506-425ba3212fb6) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-2001, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-2001 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-2001
- **State**: PUBLISHED
- **Published Date**: May 10, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:15 UTC
- **Reserved Date**: May 04, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ifconfig "-arp" in SGI IRIX 6.5 through 6.5.22m does not properly disable ARP requests from being sent or received.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20040502-01-P](ftp://patches.sgi.com/support/free/security/advisories/20040502-01-P.asc)
2. [10289](http://www.securityfocus.com/bid/10289) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-58036, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-58036 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-58036
- **State**: PUBLISHED
- **Published Date**: April 05, 2025 at 16:06 UTC
- **Last Updated**: April 07, 2025 at 18:28 UTC
- **Reserved Date**: March 26, 2025 at 14:00 UTC
- **Assigned By**: CPANSec
### Vulnerability Description
Net::Dropbox::API 1.9 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions.
Specifically Net::Dropbox::API uses the Data::Random library which specifically states that it is "Useful mostly for test programs". Data::Random uses the rand() function.
### Weakness Classification (CWE)
- CWE-338: Security Weakness
### Affected Products
**NORBU - Net::Dropbox::API**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://perldoc.perl.org/functions/rand)
2. [](https://security.metacpan.org/docs/guides/random-data-for-security.html)
3. [](https://metacpan.org/release/BAREFOOT/Data-Random-0.13/source/lib/Data/Random.pm#L537)
4. [](https://metacpan.org/release/NORBU/Net-Dropbox-API-1.9/source/lib/Net/Dropbox/API.pm#L385)
5. [](https://metacpan.org/release/NORBU/Net-Dropbox-API-1.9/source/lib/Net/Dropbox/API.pm#L11)
### Credits
- Robert Rothenberg (RRWO) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-9567, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-9567 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-9567
- **State**: PUBLISHED
- **Published Date**: December 06, 2018 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 07:24 UTC
- **Reserved Date**: April 05, 2018 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
On Pixel devices there is a bug causing verified boot to show the same certificate fingerprint despite using different signing keys. This may lead to local escalation of privilege if people are relying on those fingerprints to determine what version of the OS the device is running, with System execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-65543936.
### Affected Products
**Google Inc. - Android**
Affected versions:
- Android kernel (Status: affected)
### References
1. [106064](http://www.securityfocus.com/bid/106064)
2. [](https://source.android.com/security/bulletin/2018-12-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-9016, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-9016 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-9016
- **State**: REJECTED
- **Published Date**: March 20, 2025 at 10:09 UTC
- **Last Updated**: April 15, 2025 at 15:51 UTC
- **Reserved Date**: September 19, 2024 at 18:58 UTC
- **Assigned By**: @huntr_ai
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-2294, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-2294 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-2294
- **State**: PUBLISHED
- **Published Date**: June 15, 2010 at 01:00 UTC
- **Last Updated**: August 07, 2024 at 02:25 UTC
- **Reserved Date**: June 14, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in Plume CMS 1.2.4 and possibly earlier allows remote attackers to hijack the authentication of administrators for requests that change the administrator password via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [plumecms-password-csrf(59308)](https://exchange.xforce.ibmcloud.com/vulnerabilities/59308)
2. [40133](http://secunia.com/advisories/40133)
3. [ADV-2010-1430](http://www.vupen.com/english/advisories/2010/1430)
4. [20100609 [MajorSecurity SA-070]Plume CMS - change Admin Password via Cross-site Request Forgery](http://www.securityfocus.com/archive/1/511761/100/0/threaded) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-19892, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-19892 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-19892
- **State**: PUBLISHED
- **Published Date**: December 06, 2018 at 03:00 UTC
- **Last Updated**: August 05, 2024 at 11:44 UTC
- **Reserved Date**: December 05, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
DomainMOD through 4.11.01 has XSS via the admin/dw/add-server.php DisplayName, HostName, or UserName field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/domainmod/domainmod/issues/85) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-2699, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-2699 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-2699
- **State**: PUBLISHED
- **Published Date**: August 25, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 22:45 UTC
- **Reserved Date**: August 25, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unrestricted file upload vulnerability in admin/admin.php in PHPKit 1.6.1 allows remote authenticated administrators to execute arbitrary PHP code by uploading a .php file to the content/images/ directory using images.php. NOTE: if a PHPKit administrator must already have access to the end system to install or modify configuration of the product, then this issue might not cross privilege boundaries, and should not be included in CVE.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20050822 SQL Injection and PHP Code Injection Vulnerabilities in PHPKit 1.6.1](http://marc.info/?l=bugtraq&m=112474427221031&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-38554, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-38554 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-38554
- **State**: PUBLISHED
- **Published Date**: September 04, 2023 at 01:16 UTC
- **Last Updated**: September 30, 2024 at 18:56 UTC
- **Reserved Date**: July 20, 2023 at 03:26 UTC
- **Assigned By**: Unisoc
### Vulnerability Description
In wcn bsp driver, there is a possible out of bounds write due to a missing bounds check.This could lead to local denial of service with no additional execution privileges
### Affected Products
**Unisoc (Shanghai) Technologies Co., Ltd. - SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000**
Affected versions:
- Android11/Android12/Android13 (Status: affected)
### References
1. [](https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-43818, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-43818 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-43818
- **State**: REJECTED
- **Last Updated**: November 15, 2023 at 06:44 UTC
- **Reserved Date**: October 26, 2022 at 14:49 UTC
- **Assigned By**: atlassian
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2000-0202, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2000-0202 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2000-0202
- **State**: PUBLISHED
- **Published Date**: April 10, 2000 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 05:05 UTC
- **Reserved Date**: March 22, 2000 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Microsoft SQL Server 7.0 and Microsoft Data Engine (MSDE) 1.0 allow remote attackers to gain privileges via a malformed Select statement in an SQL query.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1041](http://www.securityfocus.com/bid/1041)
2. [MS00-014](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-014) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-10267, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-10267 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-10267
- **State**: PUBLISHED
- **Published Date**: November 14, 2017 at 23:00 UTC
- **Last Updated**: October 04, 2024 at 16:39 UTC
- **Reserved Date**: June 21, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Tuxedo component of Oracle Fusion Middleware (subcomponent: Core). Supported versions that are affected are 11.1.1, 12.1.1, 12.1.3 and 12.2.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via Jolt to compromise Oracle Tuxedo. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Tuxedo accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
### Affected Products
**Oracle Corporation - Tuxedo**
Affected versions:
- 11.1.1 (Status: affected)
- 12.1.1 (Status: affected)
- 12.1.3 (Status: affected)
- 12.2.2 (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-10269-4021872.html)
2. [101875](http://www.securityfocus.com/bid/101875) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-22268, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-22268 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-22268
- **State**: PUBLISHED
- **Published Date**: April 15, 2025 at 21:53 UTC
- **Last Updated**: April 16, 2025 at 15:07 UTC
- **Reserved Date**: January 02, 2025 at 12:02 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Uncanny Owl Uncanny Toolkit for LearnDash allows Stored XSS. This issue affects Uncanny Toolkit for LearnDash: from n/a through 3.7.0.1.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Uncanny Owl - Uncanny Toolkit for LearnDash**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/uncanny-learndash-toolkit/vulnerability/wordpress-uncanny-toolkit-for-learndash-plugin-3-7-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- zaim (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-45064, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-45064 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-45064
- **State**: PUBLISHED
- **Published Date**: October 18, 2023 at 08:44 UTC
- **Last Updated**: September 12, 2024 at 20:05 UTC
- **Reserved Date**: October 03, 2023 at 13:31 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Daisuke Takahashi(Extend Wings) OPcache Dashboard plugin <= 0.3.1 versions.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Daisuke Takahashi(Extend Wings) - OPcache Dashboard**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/opcache/wordpress-opcache-dashboard-plugin-0-3-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- LEE SE HYOUNG (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-33543, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-33543 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-33543
- **State**: PUBLISHED
- **Published Date**: September 13, 2021 at 17:55 UTC
- **Last Updated**: August 03, 2024 at 23:50 UTC
- **Reserved Date**: May 24, 2021 at 00:00 UTC
- **Assigned By**: CERTVDE
### Vulnerability Description
Multiple camera devices by UDP Technology, Geutebrück and other vendors allow unauthenticated remote access to sensitive files due to default user authentication settings. This can lead to manipulation of the device and denial of service.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-306: Security Weakness
### Affected Products
**Geutebrück - E2 Series**
Affected versions:
- EBC-21xx 1.12.13.2 (Status: affected)
- EBC-21xx 1.12.14.5 (Status: affected)
- EFD-22xx 1.12.13.2 (Status: affected)
- EFD-22xx 1.12.14.5 (Status: affected)
- ETHC-22xx 1.12.13.2 (Status: affected)
- ETHC-22xx 1.12.14.5 (Status: affected)
- EWPC-22xx 1.12.13.2 (Status: affected)
- EWPC-22xx 1.12.14.5 (Status: affected)
- EBC-21xx (Status: affected)
- EFD-22xx (Status: affected)
- ETHC-22xx (Status: affected)
- EWPC-22xx (Status: affected)
**Geutebrück - Encoder G-Code**
Affected versions:
- EEC-2xx 1.12.13.2 (Status: affected)
- EEC-2xx 1.12.14.5 (Status: affected)
- EEN-20xx 1.12.13.2 (Status: affected)
- EEN-20xx 1.12.14.5 (Status: affected)
- EEC-2xx (Status: affected)
- EEN-20xx (Status: affected)
### References
1. [](https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/)
2. [](https://us-cert.cisa.gov/ics/advisories/icsa-21-208-03)
### Credits
- Titouan Lazard and Ibrahim Ayadhi from RandoriSec reported these vulnerabilities. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-10648, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-10648 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-10648
- **State**: PUBLISHED
- **Published Date**: March 20, 2025 at 10:11 UTC
- **Last Updated**: March 20, 2025 at 14:21 UTC
- **Reserved Date**: October 31, 2024 at 20:21 UTC
- **Assigned By**: @huntr_ai
### Vulnerability Description
A path traversal vulnerability exists in the Gradio Audio component of gradio-app/gradio, as of version git 98cbcae. This vulnerability allows an attacker to control the format of the audio file, leading to arbitrary file content deletion. By manipulating the output format, an attacker can reset any file to an empty file, causing a denial of service (DOS) on the server.
### Weakness Classification (CWE)
- CWE-29: Security Weakness
### Affected Products
**gradio-app - gradio-app/gradio**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://huntr.com/bounties/667d664d-8189-458c-8ed7-483fe8f33c76) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-0097, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-0097 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-0097
- **State**: PUBLISHED
- **Published Date**: May 25, 2017 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 09:05 UTC
- **Reserved Date**: December 03, 2013 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
The ActiveDirectoryLdapAuthenticator in Spring Security 3.2.0 to 3.2.1 and 3.1.0 to 3.1.5 does not check the password length. If the directory allows anonymous binds then it may incorrectly authenticate a user who supplies an empty password.
### Affected Products
**Pivotal - Spring Security**
Affected versions:
- 3.2.0 to 3.2.1 (Status: affected)
- 3.1.0 to 3.1.5 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuapr2022.html)
2. [](https://pivotal.io/security/cve-2014-0097) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-21224, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-21224 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-21224
- **State**: REJECTED
- **Last Updated**: March 07, 2023 at 22:16 UTC
- **Reserved Date**: March 04, 2022 at 06:20 UTC
- **Assigned By**: Gallagher
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-27590, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-27590 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-27590
- **State**: PUBLISHED
- **Published Date**: March 03, 2025 at 00:00 UTC
- **Last Updated**: March 04, 2025 at 18:51 UTC
- **Reserved Date**: March 03, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In oxidized-web (aka Oxidized Web) before 0.15.0, the RANCID migration page allows an unauthenticated user to gain control over the Linux user account that is running oxidized-web.
### CVSS Metrics
- **CVSS Base Score**: 9/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**Oxidized Web project - Oxidized Web**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://github.com/ytti/oxidized-web/releases/tag/0.15.0)
2. [](https://github.com/ytti/oxidized-web/commit/a5220a0ddc57b85cd122bffee228d3ed4901668e) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-44015, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-44015 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-44015
- **State**: PUBLISHED
- **Published Date**: October 05, 2024 at 10:57 UTC
- **Last Updated**: October 08, 2024 at 15:41 UTC
- **Reserved Date**: August 18, 2024 at 21:58 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Users Control allows PHP Local File Inclusion.This issue affects Users Control: from n/a through 1.0.16.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
**Users Control - Users Control**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/users-control/wordpress-users-control-plugin-1-0-16-local-file-inclusion-vulnerability?_s_id=cve)
### Credits
- tahu.datar (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-9228, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-9228 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-9228
- **State**: PUBLISHED
- **Published Date**: August 14, 2020 at 14:43 UTC
- **Last Updated**: August 04, 2024 at 10:19 UTC
- **Reserved Date**: February 18, 2020 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
FusionCompute 8.0.0 has an information disclosure vulnerability. Due to the properly protection of certain information, attackers may exploit this vulnerability to obtain certain information.
### Affected Products
**n/a - FusionCompute**
Affected versions:
- 8.0.0 (Status: affected)
### References
1. [](https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200805-01-fc-en) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-6188, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-6188 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-6188
- **State**: PUBLISHED
- **Published Date**: November 17, 2023 at 17:31 UTC
- **Last Updated**: September 04, 2024 at 19:00 UTC
- **Reserved Date**: November 17, 2023 at 12:18 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in GetSimpleCMS 3.3.16/3.4.0a. It has been rated as critical. This issue affects some unknown processing of the file /admin/theme-edit.php. The manipulation leads to code injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-245735.
### CVSS Metrics
- **CVSS Base Score**: 4.7/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-94: Code Injection
### Affected Products
**n/a - GetSimpleCMS**
Affected versions:
- 3.3.16 (Status: affected)
- 3.4.0a (Status: affected)
### References
1. [](https://vuldb.com/?id.245735)
2. [](https://vuldb.com/?ctiid.245735)
3. [](https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1358)
4. [](https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1352)
### Credits
- testvul (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-23219, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-23219 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-23219
- **State**: PUBLISHED
- **Published Date**: January 14, 2022 at 00:00 UTC
- **Last Updated**: May 05, 2025 at 16:27 UTC
- **Reserved Date**: January 14, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujul2022.html)
2. [](https://sourceware.org/bugzilla/show_bug.cgi?id=22542)
3. [GLSA-202208-24](https://security.gentoo.org/glsa/202208-24)
4. [[debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update](https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-39525, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-39525 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-39525
- **State**: PUBLISHED
- **Published Date**: October 09, 2024 at 20:01 UTC
- **Last Updated**: October 11, 2024 at 15:15 UTC
- **Reserved Date**: June 25, 2024 at 15:12 UTC
- **Assigned By**: juniper
### Vulnerability Description
An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker sending a specific BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.
This issue only affects systems with BGP traceoptions enabled and
requires a BGP session to be already established. Systems without BGP traceoptions enabled are not affected by this issue.
This issue affects iBGP and eBGP, and both IPv4 and IPv6 are affected by this vulnerability.
This issue affects:
Junos OS:
* All versions before 21.2R3-S8,
* from 21.4 before 21.4R3-S8,
* from 22.2 before 22.2R3-S4,
* from 22.3 before 22.3R3-S4,
* from 22.4 before 22.4R3-S3,
* from 23.2 before 23.2R2-S1,
* from 23.4 before 23.4R2;
Junos OS Evolved:
* All versions before 21.2R3-S8-EVO,
* from 21.4-EVO before 21.4R3-S8-EVO,
* from 22.2-EVO before 22.2R3-S4-EVO,
* from 22.3-EVO before 22.3R3-S4-EVO,
* from 22.4-EVO before 22.4R3-S3-EVO,
* from 23.2-EVO before 23.2R2-S1-EVO,
* from 23.4-EVO before 23.4R2-EVO.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-755: Security Weakness
### Affected Products
**Juniper Networks - Junos OS**
Affected versions:
- 0 (Status: affected)
- 21.4 (Status: affected)
- 22.2 (Status: affected)
- 22.3 (Status: affected)
- 22.4 (Status: affected)
- 23.2 (Status: affected)
- 23.4 (Status: affected)
**Juniper Networks - Junos OS Evolved**
Affected versions:
- 0 (Status: affected)
- 21.4-EVO (Status: affected)
- 22.2-EVO (Status: affected)
- 22.3-EVO (Status: affected)
- 22.4-EVO (Status: affected)
- 23.2-EVO (Status: affected)
- 23.4-EVO (Status: affected)
### References
1. [](https://supportportal.juniper.net/JSA88102)
2. [](https://www.juniper.net/documentation/us/en/software/junos/cli-reference/topics/ref/statement/traceoptions-edit-protocols-bgp.html)
### Credits
- Juniper SIRT would like to acknowledge and thank Craig Dods from Meta’s Infrastructure Security Engineering team for responsibly reporting this vulnerability. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-2632, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-2632 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-2632
- **State**: PUBLISHED
- **Published Date**: July 16, 2015 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 05:17 UTC
- **Reserved Date**: March 20, 2015 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allows remote attackers to affect confidentiality via unknown vectors related to 2D.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2015:1243](http://rhn.redhat.com/errata/RHSA-2015-1243.html)
2. [](http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html)
3. [75861](http://www.securityfocus.com/bid/75861)
4. [RHSA-2015:1229](http://rhn.redhat.com/errata/RHSA-2015-1229.html)
5. [1032910](http://www.securitytracker.com/id/1032910)
6. [USN-2706-1](http://www.ubuntu.com/usn/USN-2706-1)
7. [RHSA-2015:1526](http://rhn.redhat.com/errata/RHSA-2015-1526.html)
8. [RHSA-2015:1485](http://rhn.redhat.com/errata/RHSA-2015-1485.html)
9. [RHSA-2015:1544](http://rhn.redhat.com/errata/RHSA-2015-1544.html)
10. [openSUSE-SU-2015:1289](http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html)
11. [RHSA-2015:1228](http://rhn.redhat.com/errata/RHSA-2015-1228.html)
12. [DSA-3316](http://www.debian.org/security/2015/dsa-3316)
13. [USN-2740-1](http://www.ubuntu.com/usn/USN-2740-1)
14. [GLSA-201603-11](https://security.gentoo.org/glsa/201603-11)
15. [GLSA-201701-58](https://security.gentoo.org/glsa/201701-58)
16. [RHSA-2015:1486](http://rhn.redhat.com/errata/RHSA-2015-1486.html)
17. [GLSA-201603-14](https://security.gentoo.org/glsa/201603-14)
18. [USN-2696-1](http://www.ubuntu.com/usn/USN-2696-1)
19. [DSA-3339](http://www.debian.org/security/2015/dsa-3339)
20. [RHSA-2015:1242](http://rhn.redhat.com/errata/RHSA-2015-1242.html)
21. [RHSA-2015:1488](http://rhn.redhat.com/errata/RHSA-2015-1488.html)
22. [SUSE-SU-2015:1319](http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html)
23. [SUSE-SU-2015:1320](http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html)
24. [openSUSE-SU-2015:1288](http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html)
25. [RHSA-2015:1241](http://rhn.redhat.com/errata/RHSA-2015-1241.html)
26. [RHSA-2015:1230](http://rhn.redhat.com/errata/RHSA-2015-1230.html)
27. [RHSA-2015:1604](http://rhn.redhat.com/errata/RHSA-2015-1604.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-19839, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-19839 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-19839
- **State**: PUBLISHED
- **Published Date**: January 23, 2020 at 13:42 UTC
- **Last Updated**: August 05, 2024 at 02:25 UTC
- **Reserved Date**: December 17, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
emfd in Ruckus Wireless Unleashed through 200.7.10.102.64 allows remote attackers to execute OS commands via a POST request with the attribute xcmd=import-category to admin/_cmdstat.jsp via the uploadFile attribute.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://fahrplan.events.ccc.de/congress/2019/Fahrplan/events/10816.html)
2. [](https://www.ruckuswireless.com/security/299/view/txt)
3. [](https://alephsecurity.com/2020/01/14/ruckus-wireless) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-7752, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-7752 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-7752
- **State**: PUBLISHED
- **Published Date**: October 21, 2014 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 12:56 UTC
- **Reserved Date**: October 03, 2014 at 00:00 UTC
- **Assigned By**: certcc
### Vulnerability Description
The NASIOC (aka net.endoftime.android.forumrunner.nasioc) application 3.8.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [VU#994601](http://www.kb.cert.org/vuls/id/994601)
2. [VU#582497](http://www.kb.cert.org/vuls/id/582497)
3. [](https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-3670, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-3670 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-3670
- **State**: PUBLISHED
- **Published Date**: July 28, 2023 at 07:52 UTC
- **Last Updated**: October 21, 2024 at 17:43 UTC
- **Reserved Date**: July 14, 2023 at 07:43 UTC
- **Assigned By**: CERTVDE
### Vulnerability Description
In CODESYS Development System 3.5.9.0 to 3.5.17.0 and CODESYS Scripting 4.0.0.0 to 4.1.0.0 unsafe directory permissions would allow an attacker with local access to the workstation to place potentially harmful and disguised scripts that could be executed by legitimate users.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-668: Security Weakness
### Affected Products
**CODESYS - CODESYS Development System**
Affected versions:
- 3.5.9.0 (Status: affected)
**CODESYS - CODESYS Scripting**
Affected versions:
- 4.0.0.0 (Status: affected)
### References
1. [](https://cert.vde.com/en/advisories/VDE-2023-024) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-20255, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-20255 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-20255
- **State**: PUBLISHED
- **Published Date**: May 21, 2025 at 16:43 UTC
- **Last Updated**: May 21, 2025 at 18:49 UTC
- **Reserved Date**: October 10, 2024 at 19:15 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in client join services of Cisco Webex Meetings could allow an unauthenticated, remote attacker to manipulate cached HTTP responses within the meeting join service.
This vulnerability is due to improper handling of malicious HTTP requests to the affected service. An attacker could exploit this vulnerability by manipulating stored HTTP responses within the service, also known as HTTP cache poisoning. A successful exploit could allow the attacker to cause the Webex Meetings service to return incorrect HTTP responses to clients.
### CVSS Metrics
- **CVSS Base Score**: 4.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N`
### Affected Products
**Cisco - Cisco Webex Meetings**
Affected versions:
- N/A (Status: affected)
### References
1. [cisco-sa-webex-cache-Q4xbkQBG](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-cache-Q4xbkQBG) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-47059, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-47059 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-47059
- **State**: PUBLISHED
- **Published Date**: November 16, 2023 at 16:16 UTC
- **Last Updated**: September 04, 2024 at 20:38 UTC
- **Reserved Date**: October 30, 2023 at 16:23 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Premiere Pro version 24.0 (and earlier) and 23.6 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Adobe - Premiere Pro**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/premiere_pro/apsb23-65.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-37969, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-37969 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-37969
- **State**: PUBLISHED
- **Published Date**: May 20, 2025 at 16:47 UTC
- **Last Updated**: June 04, 2025 at 12:57 UTC
- **Reserved Date**: April 16, 2025 at 04:51 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_tagged_fifo
Prevent st_lsm6dsx_read_tagged_fifo from falling in an infinite loop in
case pattern_len is equal to zero and the device FIFO is not empty.
### Affected Products
**Linux - Linux**
Affected versions:
- 801a6e0af0c6cedca2e99155e343ad385a50f08e (Status: affected)
- 801a6e0af0c6cedca2e99155e343ad385a50f08e (Status: affected)
- 801a6e0af0c6cedca2e99155e343ad385a50f08e (Status: affected)
- 801a6e0af0c6cedca2e99155e343ad385a50f08e (Status: affected)
- 801a6e0af0c6cedca2e99155e343ad385a50f08e (Status: affected)
- 801a6e0af0c6cedca2e99155e343ad385a50f08e (Status: affected)
- 801a6e0af0c6cedca2e99155e343ad385a50f08e (Status: affected)
- 801a6e0af0c6cedca2e99155e343ad385a50f08e (Status: affected)
**Linux - Linux**
Affected versions:
- 4.20 (Status: affected)
- 0 (Status: unaffected)
- 5.4.294 (Status: unaffected)
- 5.10.238 (Status: unaffected)
- 5.15.183 (Status: unaffected)
- 6.1.139 (Status: unaffected)
- 6.6.91 (Status: unaffected)
- 6.12.29 (Status: unaffected)
- 6.14.7 (Status: unaffected)
- 6.15 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/4db7d923a8c298788181b796f71adf6ca499f966)
2. [](https://git.kernel.org/stable/c/76727a1d81afde77d21ea8feaeb12d34605be6f4)
3. [](https://git.kernel.org/stable/c/35b8c0a284983b71d92d082c54b7eb655ed4194f)
4. [](https://git.kernel.org/stable/c/16857370b3a30663515956b3bd27f3def6a2cf06)
5. [](https://git.kernel.org/stable/c/9ce662851380fe2018e36e15c0bdcb1ad177ed95)
6. [](https://git.kernel.org/stable/c/dadf9116108315f2eb14c7415c7805f392c476b4)
7. [](https://git.kernel.org/stable/c/9ddb4cf2192c213e4dba1733bbcdc94cf6d85bf7)
8. [](https://git.kernel.org/stable/c/8114ef86e2058e2554111b793596f17bee23fa15) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-4604, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-4604 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-4604
- **State**: PUBLISHED
- **Published Date**: October 17, 2008 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 10:24 UTC
- **Reserved Date**: October 17, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in index.php in Easy CafeEngine 1.1 allows remote attackers to execute arbitrary SQL commands via the itemid parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [32307](http://secunia.com/advisories/32307)
2. [6762](https://www.exploit-db.com/exploits/6762)
3. [4434](http://securityreason.com/securityalert/4434)
4. [easycafeengine-index-sql-injection(45930)](https://exchange.xforce.ibmcloud.com/vulnerabilities/45930)
5. [31788](http://www.securityfocus.com/bid/31788) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-1618, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-1618 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-1618
- **State**: PUBLISHED
- **Published Date**: April 08, 2020 at 19:25 UTC
- **Last Updated**: September 17, 2024 at 01:56 UTC
- **Reserved Date**: November 04, 2019 at 00:00 UTC
- **Assigned By**: juniper
### Vulnerability Description
On Juniper Networks EX and QFX Series, an authentication bypass vulnerability may allow a user connected to the console port to login as root without any password. This issue might only occur in certain scenarios: • At the first reboot after performing device factory reset using the command “request system zeroize”; or • A temporary moment during the first reboot after the software upgrade when the device configured in Virtual Chassis mode. This issue affects Juniper Networks Junos OS on EX and QFX Series: 14.1X53 versions prior to 14.1X53-D53; 15.1 versions prior to 15.1R7-S4; 15.1X53 versions prior to 15.1X53-D593; 16.1 versions prior to 16.1R7-S4; 17.1 versions prior to 17.1R2-S11, 17.1R3-S1; 17.2 versions prior to 17.2R3-S3; 17.3 versions prior to 17.3R2-S5, 17.3R3-S6; 17.4 versions prior to 17.4R2-S9, 17.4R3; 18.1 versions prior to 18.1R3-S8; 18.2 versions prior to 18.2R2; 18.3 versions prior to 18.3R1-S7, 18.3R2. This issue does not affect Juniper Networks Junos OS 12.3.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-288: Security Weakness
### Affected Products
**Juniper Networks - Junos OS**
Affected versions:
- 12.3 (Status: unaffected)
- 14.1X53 (Status: affected)
- 15.1 (Status: affected)
- 15.1X53 (Status: affected)
- 16.1 (Status: affected)
- 17.1 (Status: affected)
- 17.2 (Status: affected)
- 17.3 (Status: affected)
- 17.4 (Status: affected)
- 18.1 (Status: affected)
- 18.2 (Status: affected)
- 18.3 (Status: affected)
### References
1. [](https://kb.juniper.net/JSA11001) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2003-0257, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2003-0257 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2003-0257
- **State**: PUBLISHED
- **Published Date**: March 16, 2004 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 01:50 UTC
- **Reserved Date**: May 07, 2003 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Format string vulnerability in the printer capability for IBM AIX .3, 5.1, and 5.2 allows local users to gain printq or root privileges.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [aix-print-format-string(12000)](https://exchange.xforce.ibmcloud.com/vulnerabilities/12000)
2. [MSS-OAR-E01-2003:0660.1](http://www-1.ibm.com/services/continuity/recover1.nsf/MSS/MSS-OAR-E01-2003.0660.1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-1764, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-1764 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-1764
- **State**: PUBLISHED
- **Published Date**: May 22, 2009 at 18:00 UTC
- **Last Updated**: August 07, 2024 at 05:27 UTC
- **Reserved Date**: May 22, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in inc/ajax.asp in MaxCMS 2.0 allows remote attackers to execute arbitrary SQL commands via the id parameter in a digg action.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [8726](https://www.exploit-db.com/exploits/8726)
2. [34981](http://www.securityfocus.com/bid/34981)
3. [maxcms-ajax-sql-injection(50553)](https://exchange.xforce.ibmcloud.com/vulnerabilities/50553) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-31115, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-31115 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-31115
- **State**: PUBLISHED
- **Published Date**: March 31, 2024 at 18:05 UTC
- **Last Updated**: August 02, 2024 at 01:46 UTC
- **Reserved Date**: March 28, 2024 at 06:58 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Unrestricted Upload of File with Dangerous Type vulnerability in QuanticaLabs Chauffeur Taxi Booking System for WordPress.This issue affects Chauffeur Taxi Booking System for WordPress: from n/a through 7.2.
### CVSS Metrics
- **CVSS Base Score**: 10/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-434: Security Weakness
### Affected Products
**QuanticaLabs - Chauffeur Taxi Booking System for WordPress**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/chauffeur-booking-system/wordpress-chauffeur-taxi-booking-system-for-wordpress-plugin-6-9-arbitrary-file-upload-vulnerability?_s_id=cve)
### Credits
- Kursat Cetin (Patchstack) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-25055, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-25055 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-25055
- **State**: PUBLISHED
- **Published Date**: December 26, 2021 at 21:54 UTC
- **Last Updated**: August 05, 2024 at 03:00 UTC
- **Reserved Date**: December 26, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in the libpulse-binding crate before 2.6.0 for Rust. It mishandles a panic that crosses a Foreign Function Interface (FFI) boundary.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://rustsec.org/advisories/RUSTSEC-2019-0038.html)
2. [](https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/libpulse-binding/RUSTSEC-2019-0038.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-32159, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-32159 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-32159
- **State**: PUBLISHED
- **Published Date**: May 03, 2024 at 01:56 UTC
- **Last Updated**: August 02, 2024 at 15:10 UTC
- **Reserved Date**: May 03, 2023 at 20:10 UTC
- **Assigned By**: zdi
### Vulnerability Description
PDF-XChange Editor PDF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of PDF files. Crafted data in a PDF file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17765.
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**PDF-XChange - PDF-XChange Editor**
Affected versions:
- 9.3.361.0 (Status: affected)
### References
1. [ZDI-23-641](https://www.zerodayinitiative.com/advisories/ZDI-23-641/)
2. [vendor-provided URL](https://www.tracker-software.com/product/pdf-xchange-editor/history) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-7980, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-7980 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-7980
- **State**: REJECTED
- **Published Date**: March 05, 2019 at 20:00 UTC
- **Last Updated**: March 05, 2019 at 19:57 UTC
- **Reserved Date**: March 09, 2018 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-1080, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-1080 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-1080
- **State**: PUBLISHED
- **Published Date**: April 29, 2021 at 18:50 UTC
- **Last Updated**: August 03, 2024 at 15:55 UTC
- **Reserved Date**: November 12, 2020 at 00:00 UTC
- **Assigned By**: nvidia
### Vulnerability Description
NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), in which certain input data is not validated, which may lead to information disclosure, tampering of data, or denial of service. This affects vGPU version 12.x (prior to 12.2), version 11.x (prior to 11.4) and version 8.x (prior 8.7).
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**NVIDIA - NVIDIA Virtual GPU Software**
Affected versions:
- vGPU version all version prior to 8.7, all version prior to 11.4, and all version prior to 12.2 (Status: affected)
### References
1. [](https://nvidia.custhelp.com/app/answers/detail/a_id/5172) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.