System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2009-3470, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2009-3470 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2009-3470
- **State**: PUBLISHED
- **Published Date**: September 29, 2009 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 06:31 UTC
- **Reserved Date**: September 29, 2009 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
IBM Informix Dynamic Server (IDS) 10.00 before 10.00.xC11, 11.10 before 11.10.xC4, and 11.50 before 11.50.xC5 allows remote attackers to cause a denial of service (memory corruption, assertion failure, and daemon crash) by sending a long password over a JDBC connection.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [36538](http://www.securityfocus.com/bid/36538)
2. [IC61195](http://www-01.ibm.com/support/docview.wss?uid=swg1IC61195)
3. [1022955](http://www.securitytracker.com/id?1022955)
4. [36853](http://secunia.com/advisories/36853)
5. [ADV-2009-2786](http://www.vupen.com/english/advisories/2009/2786) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-52871, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-52871 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-52871
- **State**: PUBLISHED
- **Published Date**: May 21, 2024 at 15:32 UTC
- **Last Updated**: May 04, 2025 at 07:44 UTC
- **Reserved Date**: May 21, 2024 at 15:19 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
soc: qcom: llcc: Handle a second device without data corruption
Usually there is only one llcc device. But if there were a second, even
a failed probe call would modify the global drv_data pointer. So check
if drv_data is valid before overwriting it.
### Affected Products
**Linux - Linux**
Affected versions:
- a3134fb09e0bc5bee76e13bf863173b86f21cf87 (Status: affected)
- a3134fb09e0bc5bee76e13bf863173b86f21cf87 (Status: affected)
- a3134fb09e0bc5bee76e13bf863173b86f21cf87 (Status: affected)
- a3134fb09e0bc5bee76e13bf863173b86f21cf87 (Status: affected)
- a3134fb09e0bc5bee76e13bf863173b86f21cf87 (Status: affected)
- a3134fb09e0bc5bee76e13bf863173b86f21cf87 (Status: affected)
- a3134fb09e0bc5bee76e13bf863173b86f21cf87 (Status: affected)
**Linux - Linux**
Affected versions:
- 4.19 (Status: affected)
- 0 (Status: unaffected)
- 5.4.261 (Status: unaffected)
- 5.10.201 (Status: unaffected)
- 5.15.139 (Status: unaffected)
- 6.1.63 (Status: unaffected)
- 6.5.12 (Status: unaffected)
- 6.6.2 (Status: unaffected)
- 6.7 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/cc1a1dcb411fe224f48553cfdcdfe6e61395b69c)
2. [](https://git.kernel.org/stable/c/5e5b85ea0f4bc484bfe4cc73ead51fa48d2366a0)
3. [](https://git.kernel.org/stable/c/995ee1e84e8db7fa5dcdde7dfe0bd7bb6f9bbb8c)
4. [](https://git.kernel.org/stable/c/f0ef883cae309bc5e8cdfcdbc1b4822732ce20a8)
5. [](https://git.kernel.org/stable/c/3565684309e54fa998ea27f37028d67cc3e1dff2)
6. [](https://git.kernel.org/stable/c/1143bfb9b055897975aeaea254da148e19524493)
7. [](https://git.kernel.org/stable/c/f1a1bc8775b26345aba2be278118999e7f661d3d) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-14873, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-14873 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-14873
- **State**: PUBLISHED
- **Published Date**: August 03, 2018 at 00:00 UTC
- **Last Updated**: August 05, 2024 at 09:38 UTC
- **Reserved Date**: August 02, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered in Rincewind 0.1. There is a cross-site scripting (XSS) vulnerability involving a p=account request to index.php and another file named commonPages.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/havysec/Useful_Code/blob/master/mycve/006.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-1197, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-1197 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-1197
- **State**: PUBLISHED
- **Published Date**: February 12, 2025 at 12:31 UTC
- **Last Updated**: February 18, 2025 at 17:35 UTC
- **Reserved Date**: February 10, 2025 at 15:20 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability has been found in code-projects Real Estate Property Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /_parse/load_user-profile.php. The manipulation of the argument userhash leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
- CWE-74: Security Weakness
### Affected Products
**code-projects - Real Estate Property Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-295105 | code-projects Real Estate Property Management System load_user-profile.php sql injection](https://vuldb.com/?id.295105)
2. [VDB-295105 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.295105)
3. [Submit #496856 | code-projects Real Estate Property Management System v1.0 SQL INJECTION](https://vuldb.com/?submit.496856)
4. [](https://github.com/YinshengLu/CVE/blob/main/cve3.pdf)
5. [](https://code-projects.org/)
### Credits
- Resyul (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-4586, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-4586 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-4586
- **State**: REJECTED
- **Last Updated**: September 14, 2023 at 18:42 UTC
- **Reserved Date**: January 02, 2018 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-25244, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-25244 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-25244
- **State**: PUBLISHED
- **Published Date**: February 04, 2021 at 19:36 UTC
- **Last Updated**: August 03, 2024 at 19:56 UTC
- **Reserved Date**: January 15, 2021 at 00:00 UTC
- **Assigned By**: trendmicro
### Vulnerability Description
An improper access control vulnerability in Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain various pieces of configuration informaiton.
### Affected Products
**Trend Micro - Trend Micro Worry-Free Business Security**
Affected versions:
- 10.0 SP1 (Status: affected)
### References
1. [](https://success.trendmicro.com/solution/000284206)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-21-123/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-5220, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-5220 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-5220
- **State**: PUBLISHED
- **Published Date**: October 09, 2006 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 19:41 UTC
- **Reserved Date**: October 09, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple PHP remote file inclusion vulnerabilities in WebYep 1.1.9, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via the webyep_sIncludePath in (1) files in the programm/lib/ directory including (a) WYApplication.php, (b) WYDocument.php, (c) WYEditor.php, (d) WYElement.php, (e) WYFile.php, (f) WYHTMLTag.php, (g) WYImage.php, (h) WYLanguage.php, (i) WYLink.php, (j) WYPath.php, (k) WYPopupWindowLink.php, (l) WYSelectMenu.php, and (m) WYTextArea.php; (2) files in the programm/elements/ directory including (n) WYGalleryElement.php, (o) WYGuestbookElement.php, (p) WYImageElement.php, (q) WYLogonButtonElement.php, (r) WYLongTextElement.php, (s) WYLoopElement.php, (t) WYMenuElement.php, and (u) WYShortTextElement.php; and (3) programm/webyep.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1702](http://securityreason.com/securityalert/1702)
2. [2496](https://www.exploit-db.com/exploits/2496)
3. [29654](http://www.osvdb.org/29654)
4. [29648](http://www.osvdb.org/29648)
5. [29660](http://www.osvdb.org/29660)
6. [](http://advisories.echo.or.id/adv/adv48-theday-2006.txt)
7. [29645](http://www.osvdb.org/29645)
8. [20406](http://www.securityfocus.com/bid/20406)
9. [29644](http://www.osvdb.org/29644)
10. [20061009 [ECHO_ADV_48$2006] WebYep <= 1.1.9 (webyep_sIncludePath) Multiple Remote File Inclusion Vulnerability](http://www.securityfocus.com/archive/1/448009/100/0/threaded)
11. [29649](http://www.osvdb.org/29649)
12. [29656](http://www.osvdb.org/29656)
13. [29659](http://www.osvdb.org/29659)
14. [ADV-2006-3972](http://www.vupen.com/english/advisories/2006/3972)
15. [29652](http://www.osvdb.org/29652)
16. [29650](http://www.osvdb.org/29650)
17. [webyep-webyep-file-include(29397)](https://exchange.xforce.ibmcloud.com/vulnerabilities/29397)
18. [22336](http://secunia.com/advisories/22336)
19. [](http://www.obdev.at/products/webyep/release-notes.html)
20. [29658](http://www.osvdb.org/29658)
21. [1017023](http://securitytracker.com/id?1017023)
22. [29653](http://www.osvdb.org/29653)
23. [29657](http://www.osvdb.org/29657)
24. [29662](http://www.osvdb.org/29662)
25. [29663](http://www.osvdb.org/29663)
26. [29661](http://www.osvdb.org/29661)
27. [29647](http://www.osvdb.org/29647)
28. [29646](http://www.osvdb.org/29646)
29. [29643](http://www.osvdb.org/29643)
30. [29651](http://www.osvdb.org/29651)
31. [29655](http://www.osvdb.org/29655) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-0340, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-0340 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-0340
- **State**: PUBLISHED
- **Published Date**: January 18, 2007 at 02:00 UTC
- **Last Updated**: August 07, 2024 at 12:12 UTC
- **Reserved Date**: January 17, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
SQL injection vulnerability in inc/header.inc.php in ThWboard 3.0b2.84-php5 and earlier allows remote attackers to execute arbitrary SQL commands via the board[styleid] parameter to index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [32837](http://osvdb.org/32837)
2. [3124](https://www.exploit-db.com/exploits/3124)
3. [23735](http://secunia.com/advisories/23735) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-3732, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-3732 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-3732
- **State**: PUBLISHED
- **Published Date**: April 23, 2024 at 09:32 UTC
- **Last Updated**: August 01, 2024 at 20:20 UTC
- **Reserved Date**: April 12, 2024 at 18:40 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The GeoDirectory – WordPress Business Directory Plugin, or Classified Directory plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'gd_single_tabs' shortcode in all versions up to, and including, 2.3.48 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Affected Products
**paoltaia - GeoDirectory – WordPress Business Directory Plugin, or Classified Directory**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/5a91e786-f570-4c6c-b1c7-0110774cb808?source=cve)
2. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3071121%40geodirectory&new=3071121%40geodirectory&sfp_email=&sfph_mail=)
### Credits
- Krzysztof Zając |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-6323, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-6323 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-6323
- **State**: PUBLISHED
- **Published Date**: June 17, 2019 at 15:55 UTC
- **Last Updated**: August 04, 2024 at 20:16 UTC
- **Reserved Date**: January 15, 2019 at 00:00 UTC
- **Assigned By**: hp
### Vulnerability Description
HP Color LaserJet Pro M280-M281 Multifunction Printer series (before v. 20190419), HP LaserJet Pro MFP M28-M31 Printer series (before v. 20190426) may have an embedded web server potentially vulnerable to reflected XSS in wireless configuration page.
### Affected Products
**n/a - HP Color LaserJet Pro M280-M281 Multifunction Printer series; HP LaserJet Pro MFP M28-M31 Printer series**
Affected versions:
- before 20190419 (Status: affected)
- before 20190426 (Status: affected)
### References
1. [](https://support.hp.com/us-en/document/c06356322) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-45845, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-45845 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-45845
- **State**: PUBLISHED
- **Published Date**: January 25, 2022 at 12:55 UTC
- **Last Updated**: August 04, 2024 at 04:54 UTC
- **Reserved Date**: December 27, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Path Sanity Check script of FreeCAD 0.19 is vulnerable to OS command injection, allowing an attacker to execute arbitrary commands via a crafted FCStd document.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://tracker.freecad.org/view.php?id=4810)
2. [](https://github.com/FreeCAD/FreeCAD/pull/5306)
3. [DSA-5229](https://www.debian.org/security/2022/dsa-5229) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-2770, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-2770 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-2770
- **State**: PUBLISHED
- **Published Date**: August 15, 2012 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 19:42 UTC
- **Reserved Date**: May 18, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Authen::ExternalAuth extension before 0.11 for Best Practical Solutions RT allows remote attackers to obtain a logged-in session via unspecified vectors related to the "URL of a RSS feed of the user."
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [54681](http://www.securityfocus.com/bid/54681)
2. [authenexternalauth-url-sec-bypass(77213)](https://exchange.xforce.ibmcloud.com/vulnerabilities/77213)
3. [50060](http://secunia.com/advisories/50060)
4. [[rt-announce] 20120725 Security vulnerabilities in three commonly deployed RT extensions](http://lists.bestpractical.com/pipermail/rt-announce/2012-July/000208.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-3243, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-3243 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-3243
- **State**: PUBLISHED
- **Published Date**: October 17, 2018 at 01:00 UTC
- **Last Updated**: October 02, 2024 at 19:32 UTC
- **Reserved Date**: December 15, 2017 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Applications Framework component of Oracle E-Business Suite (subcomponent: None). Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Applications Framework. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Applications Framework, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Applications Framework accessible data as well as unauthorized update, insert or delete access to some of Oracle Applications Framework accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
### Affected Products
**Oracle Corporation - Applications Framework**
Affected versions:
- 12.1.3 (Status: affected)
- 12.2.3 (Status: affected)
- 12.2.4 (Status: affected)
- 12.2.5 (Status: affected)
- 12.2.6 (Status: affected)
### References
1. [105630](http://www.securityfocus.com/bid/105630)
2. [1041897](http://www.securitytracker.com/id/1041897)
3. [](http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-15659, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-15659 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-15659
- **State**: PUBLISHED
- **Published Date**: August 10, 2020 at 17:43 UTC
- **Last Updated**: August 04, 2024 at 13:22 UTC
- **Reserved Date**: July 10, 2020 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
Mozilla developers and community members reported memory safety bugs present in Firefox 78 and Firefox ESR 78.0. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 79, Firefox ESR < 68.11, Firefox ESR < 78.1, Thunderbird < 68.11, and Thunderbird < 78.1.
### Affected Products
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
**Mozilla - Firefox ESR**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
**Mozilla - Thunderbird**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://www.mozilla.org/security/advisories/mfsa2020-30/)
2. [](https://www.mozilla.org/security/advisories/mfsa2020-35/)
3. [](https://www.mozilla.org/security/advisories/mfsa2020-32/)
4. [](https://www.mozilla.org/security/advisories/mfsa2020-33/)
5. [](https://www.mozilla.org/security/advisories/mfsa2020-31/)
6. [](https://bugzilla.mozilla.org/buglist.cgi?bug_id=1550133%2C1633880%2C1643613%2C1644839%2C1645835%2C1646006%2C1646787%2C1649347%2C1650811%2C1651678)
7. [openSUSE-SU-2020:1179](http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00022.html)
8. [openSUSE-SU-2020:1189](http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html)
9. [openSUSE-SU-2020:1205](http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00032.html)
10. [USN-4443-1](https://usn.ubuntu.com/4443-1/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-29596, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-29596 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-29596
- **State**: PUBLISHED
- **Published Date**: April 26, 2023 at 00:00 UTC
- **Last Updated**: February 03, 2025 at 17:48 UTC
- **Reserved Date**: April 07, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer Overflow vulnerability found in ByronKnoll Cmix v.19 allows an attacker to execute arbitrary code and cause a denial of service via the paq8 function.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/byronknoll/cmix/issues/54) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-27279, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-27279 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-27279
- **State**: PUBLISHED
- **Published Date**: February 22, 2021 at 19:04 UTC
- **Last Updated**: August 03, 2024 at 20:48 UTC
- **Reserved Date**: February 16, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
MyBB before 1.8.25 allows stored XSS via nested [email] tags with MyCode (aka BBCode).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://mybb.com/versions/1.8.25/)
2. [](https://github.com/mybb/mybb/security/advisories/GHSA-6483-hcpp-p75w)
3. [](https://github.com/mybb/mybb/commit/cb781b49116bf5c4d8deca3e17498122b701677a) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-36139, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-36139 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-36139
- **State**: PUBLISHED
- **Published Date**: June 04, 2021 at 15:04 UTC
- **Last Updated**: August 04, 2024 at 17:23 UTC
- **Reserved Date**: January 04, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
BloofoxCMS 0.5.2.1 allows Reflected Cross-Site Scripting (XSS) vulnerability by inserting a XSS payload within the 'fileurl' parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://muteb.io/2020/12/29/BloofoxCMS-Multiple-Vulnerabilities.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-16999, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-16999 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-16999
- **State**: REJECTED
- **Published Date**: January 04, 2018 at 20:00 UTC
- **Last Updated**: January 04, 2018 at 19:57 UTC
- **Reserved Date**: November 27, 2017 at 00:00 UTC
- **Assigned By**: debian
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-24996, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-24996 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-24996
- **State**: PUBLISHED
- **Published Date**: March 11, 2025 at 16:59 UTC
- **Last Updated**: May 19, 2025 at 21:38 UTC
- **Reserved Date**: January 30, 2025 at 15:14 UTC
- **Assigned By**: microsoft
### Vulnerability Description
External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-73: Security Weakness
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.17763.0 (Status: affected)
**Microsoft - Windows Server 2022**
Affected versions:
- 10.0.20348.0 (Status: affected)
**Microsoft - Windows 10 Version 21H2**
Affected versions:
- 10.0.19044.0 (Status: affected)
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 10 Version 22H2**
Affected versions:
- 10.0.19045.0 (Status: affected)
**Microsoft - Windows Server 2025 (Server Core installation)**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows 11 version 22H3**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows 11 Version 23H2**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)**
Affected versions:
- 10.0.25398.0 (Status: affected)
**Microsoft - Windows 11 Version 24H2**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows Server 2025**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.10240.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.14393.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.1.7601.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.9200.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.9600.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.9600.0 (Status: affected)
### References
1. [NTLM Hash Disclosure Spoofing Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24996) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-30945, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-30945 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-30945
- **State**: PUBLISHED
- **Published Date**: August 24, 2021 at 18:50 UTC
- **Last Updated**: August 03, 2024 at 22:48 UTC
- **Reserved Date**: April 13, 2021 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.6.2, tvOS 15.2, macOS Monterey 12.1, Security Update 2021-008 Catalina, iOS 15.2 and iPadOS 15.2, watchOS 8.3. A local attacker may be able to elevate their privileges.
### Affected Products
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT212975)
2. [](https://support.apple.com/en-us/HT212976)
3. [](https://support.apple.com/en-us/HT212978)
4. [](https://support.apple.com/en-us/HT212979)
5. [](https://support.apple.com/en-us/HT212981)
6. [](https://support.apple.com/en-us/HT212980) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-0180, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-0180 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-0180
- **State**: PUBLISHED
- **Published Date**: June 28, 2010 at 17:00 UTC
- **Last Updated**: September 16, 2024 at 18:03 UTC
- **Reserved Date**: January 06, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Install/Filesystem.pm in Bugzilla 3.5.1 through 3.6 and 3.7, when use_suexec is enabled, uses world-readable permissions for the localconfig files, which allows local users to read sensitive configuration fields, as demonstrated by the database password field and the site_wide_secret field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.bugzilla.org/security/3.2.6/)
2. [40300](http://secunia.com/advisories/40300)
3. [ADV-2010-1595](http://www.vupen.com/english/advisories/2010/1595)
4. [](https://bugzilla.mozilla.org/show_bug.cgi?id=561797)
5. [41144](http://www.securityfocus.com/bid/41144) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-0315, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-0315 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-0315
- **State**: PUBLISHED
- **Published Date**: March 18, 2004 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 00:17 UTC
- **Reserved Date**: March 17, 2004 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer overflow in Avirt Voice 4.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long GET request on port 1080.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20040223 Remote Buffer Overflow in Avirt Voice 4.0](http://marc.info/?l=bugtraq&m=107756584609841&w=2)
2. [9721](http://www.securityfocus.com/bid/9721)
3. [avirt-voice-get-bo(15288)](https://exchange.xforce.ibmcloud.com/vulnerabilities/15288) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-0718, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-0718 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-0718
- **State**: PUBLISHED
- **Published Date**: February 25, 2011 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 22:05 UTC
- **Reserved Date**: January 31, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Red Hat Network (RHN) Satellite Server 5.4 does not use a time delay after a failed login attempt, which makes it easier for remote attackers to conduct brute force password guessing attacks.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [46528](http://www.securityfocus.com/bid/46528)
2. [ADV-2011-0491](http://www.vupen.com/english/advisories/2011/0491)
3. [RHSA-2011:0300](http://www.redhat.com/support/errata/RHSA-2011-0300.html)
4. [](https://bugzilla.redhat.com/show_bug.cgi?id=672159)
5. [1025116](http://www.securitytracker.com/id?1025116)
6. [rhnss-weak-security(65657)](https://exchange.xforce.ibmcloud.com/vulnerabilities/65657)
7. [43487](http://secunia.com/advisories/43487) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-27612, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-27612 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-27612
- **State**: PUBLISHED
- **Published Date**: March 08, 2024 at 00:00 UTC
- **Last Updated**: March 24, 2025 at 21:07 UTC
- **Reserved Date**: February 26, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Numbas editor before 7.3 mishandles editing of themes and extensions.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/numbas/Numbas)
2. [](https://www.numbas.org.uk/blog/2024/03/development-update-march-2024/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-2328, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-2328 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-2328
- **State**: PUBLISHED
- **Published Date**: August 16, 2005 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 01:22 UTC
- **Reserved Date**: August 16, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Clearswift MAILsweeper for SMTP before 4.3_13 allows remote attackers to cause a denial of service (infinite loop) via an e-mail with a crafted RAR archive attached.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [10732](http://www.secunia.com/advisories/10732/)
2. [3742](http://www.osvdb.org/3742)
3. [mailsweeper-smtp-rar-dos(14979)](https://exchange.xforce.ibmcloud.com/vulnerabilities/14979)
4. [9556](http://www.securityfocus.com/bid/9556) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-2725, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-2725 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-2725
- **State**: PUBLISHED
- **Published Date**: February 04, 2014 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 23:08 UTC
- **Reserved Date**: July 11, 2011 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Directory traversal vulnerability in Ark 4.7.x and earlier allows remote attackers to delete and force the display of arbitrary files via .. (dot dot) sequences in a zip file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [openSUSE-SU-2012:0322](http://lists.opensuse.org/opensuse-updates/2012-03/msg00002.html)
2. [20111007 Medium severity flaw with Ark](http://seclists.org/fulldisclosure/2011/Oct/351)
3. [](https://bugzilla.redhat.com/show_bug.cgi?id=725764)
4. [](https://bugzilla.novell.com/show_bug.cgi?id=708268)
5. [](http://packetstormsecurity.com/files/105610/Ark-2.16-Directory-Traversal.html)
6. [USN-1276-1](http://www.ubuntu.com/usn/USN-1276-1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-42423, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-42423 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-42423
- **State**: PUBLISHED
- **Published Date**: January 26, 2023 at 00:00 UTC
- **Last Updated**: March 31, 2025 at 17:36 UTC
- **Reserved Date**: October 03, 2022 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of TIF files. Crafted data in a TIF file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18716.
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**PDF-XChange - PDF-XChange Editor**
Affected versions:
- 9.4.363.0 (Status: affected)
### References
1. [](https://www.tracker-software.com/product/pdf-xchange-editor/history)
2. [](https://www.zerodayinitiative.com/advisories/ZDI-22-1390/)
### Credits
- Rocco Calvi (@TecR0c) with TecSecurity |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-32978, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-32978 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-32978
- **State**: PUBLISHED
- **Published Date**: April 04, 2022 at 19:45 UTC
- **Last Updated**: April 16, 2025 at 16:31 UTC
- **Reserved Date**: May 13, 2021 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
The programming protocol allows for a previously entered password and lock state to be read by an attacker. If the previously entered password was successful, the attacker can then use the password to unlock Automation Direct CLICK PLC CPU Modules: C0-1x CPUs with firmware prior to v3.00.
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-256: Security Weakness
### Affected Products
**Automation Direct - CLICK PLC CPU Modules: C0-1x CPUs**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.cisa.gov/uscert/ics/advisories/icsa-21-166-02)
### Credits
- Irfan Ahmed and Adeen Ayub of Virginia Commonwealth University and Hyunguk Yoo of the University of New Orleans reported these vulnerabilities to Automation Direct. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-4404, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-4404 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-4404
- **State**: REJECTED
- **Last Updated**: August 19, 2024 at 15:13 UTC
- **Reserved Date**: December 11, 2022 at 13:04 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-0526, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-0526 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-0526
- **State**: PUBLISHED
- **Published Date**: June 22, 2015 at 15:00 UTC
- **Last Updated**: August 06, 2024 at 04:10 UTC
- **Reserved Date**: December 17, 2014 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in EMC RSA Validation Manager (RVM) 3.2 before build 201 allow remote attackers to inject arbitrary web script or HTML via the (1) displayMode or (2) wrapPreDisplayMode parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1032590](http://www.securitytracker.com/id/1032590)
2. [20150616 ESA-2015-043: RSA Validation Manager Security Update for Multiple Vulnerabilities](http://seclists.org/bugtraq/2015/Jun/88) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-1564, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-1564 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-1564
- **State**: PUBLISHED
- **Published Date**: March 22, 2023 at 12:31 UTC
- **Last Updated**: August 02, 2024 at 05:49 UTC
- **Reserved Date**: March 22, 2023 at 10:36 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in SourceCodester Air Cargo Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file admin/transactions/update_status.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223556.
### CVSS Metrics
- **CVSS Base Score**: 6.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**SourceCodester - Air Cargo Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [](https://vuldb.com/?id.223556)
2. [](https://vuldb.com/?ctiid.223556)
3. [](https://github.com/333123www/bug_report/blob/main/SQLi-1.md)
### Credits
- 133233 (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-22141, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-22141 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-22141
- **State**: PUBLISHED
- **Published Date**: January 08, 2025 at 18:27 UTC
- **Last Updated**: January 08, 2025 at 19:27 UTC
- **Reserved Date**: December 30, 2024 at 03:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
WeGIA is a web manager for charitable institutions. A SQL Injection vulnerability was identified in the /dao/verificar_recursos_cargo.php endpoint, specifically in the cargo parameter. This vulnerability allows attackers to execute arbitrary SQL commands, compromising the confidentiality, integrity, and availability of the database. This vulnerability is fixed in 3.2.8.
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**nilsonLazarin - WeGIA**
Affected versions:
- < 3.2.8 (Status: affected)
### References
1. [https://github.com/nilsonLazarin/WeGIA/security/advisories/GHSA-w7hp-2w2c-p636](https://github.com/nilsonLazarin/WeGIA/security/advisories/GHSA-w7hp-2w2c-p636) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-5446, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-5446 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-5446
- **State**: PUBLISHED
- **Published Date**: December 04, 2014 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 11:41 UTC
- **Reserved Date**: August 25, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in the DisplayChartPDF servlet in ZOHO ManageEngine Netflow Analyzer 8.6 through 10.2 and IT360 10.3 allows remote attackers and remote authenticated users to read arbitrary files via a .. (dot dot) in the filename parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [netflow-cve20145446-dir-traversal(99046)](https://exchange.xforce.ibmcloud.com/vulnerabilities/99046)
2. [](https://support.zoho.com/portal/manageengine/helpcenter/articles/cve-2014-5445-cve-2014-5446-fix-for-arbitrary-file-download)
3. [](http://packetstormsecurity.com/files/129336/ManageEngine-Netflow-Analyzer-IT360-File-Download.html)
4. [20141203 Re: [The ManageOwnage Series, part IX]: 0-day arbitrary file download in NetFlow Analyzer and IT360](http://www.securityfocus.com/archive/1/534141/100/0/threaded)
5. [71404](http://www.securityfocus.com/bid/71404)
6. [](https://raw.githubusercontent.com/pedrib/PoC/master/ManageEngine/me_netflow_it360_file_dl.txt)
7. [20141130 [The ManageOwnage Series, part IX]: 0-day arbitrary file download in NetFlow Analyzer and IT360](http://www.securityfocus.com/archive/1/534122/100/0/threaded)
8. [20141203 [The ManageOwnage Series, part IX]: 0-day arbitrary file download in NetFlow Analyzer and IT360](http://seclists.org/fulldisclosure/2014/Dec/9) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-36192, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-36192 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-36192
- **State**: PUBLISHED
- **Published Date**: November 03, 2021 at 10:17 UTC
- **Last Updated**: October 25, 2024 at 13:43 UTC
- **Reserved Date**: July 06, 2021 at 00:00 UTC
- **Assigned By**: fortinet
### Vulnerability Description
An exposure of sensitive information to an unauthorized actor [CWE-200] vulnerability in FortiManager 7.0.1 and below, 6.4.6 and below, 6.2.x, 6.0.x, 5.6.0 may allow a FortiGate user to see scripts from other ADOMS.
### CVSS Metrics
- **CVSS Base Score**: 5.2/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N/E:F/RL:U/RC:C`
### Affected Products
**Fortinet - Fortinet FortiManager**
Affected versions:
- FortiManager 7.0.1 and below, 6.4.6 and below, 6.2.x, 6.0.x, 5.6.0 (Status: affected)
### References
1. [](https://fortiguard.com/advisory/FG-IR-21-103) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-3837, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-3837 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-3837
- **State**: PUBLISHED
- **Published Date**: December 24, 2011 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 23:46 UTC
- **Reserved Date**: September 26, 2011 at 00:00 UTC
- **Assigned By**: flexera
### Vulnerability Description
Directory traversal vulnerability in blog_system/data_functions.php in Wuzly 2.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the preview parameter to index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [wuzly-index-file-include(71903)](https://exchange.xforce.ibmcloud.com/vulnerabilities/71903)
2. [46163](http://secunia.com/advisories/46163)
3. [77912](http://osvdb.org/77912)
4. [](http://secunia.com/secunia_research/2011-87/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-27971, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-27971 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-27971
- **State**: PUBLISHED
- **Published Date**: April 28, 2023 at 15:55 UTC
- **Last Updated**: January 30, 2025 at 20:10 UTC
- **Reserved Date**: March 08, 2023 at 23:10 UTC
- **Assigned By**: hp
### Vulnerability Description
Certain HP LaserJet Pro print products are potentially vulnerable to Buffer Overflow and/or Elevation of Privilege.
### Affected Products
**HP Inc. - HP LaserJet Pro**
Affected versions:
- See HP Security Bulletin reference for affected versions. (Status: affected)
### References
1. [](https://support.hp.com/us-en/document/ish_7919962-7920003-16/hpsbpi03839) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-10561, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-10561 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-10561
- **State**: PUBLISHED
- **Published Date**: October 31, 2024 at 02:00 UTC
- **Last Updated**: October 31, 2024 at 13:42 UTC
- **Reserved Date**: October 30, 2024 at 19:46 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability was found in Codezips Pet Shop Management System 1.0. It has been classified as critical. This affects an unknown part of the file birdsupdate.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Codezips - Pet Shop Management System**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-282561 | Codezips Pet Shop Management System birdsupdate.php sql injection](https://vuldb.com/?id.282561)
2. [VDB-282561 | CTI Indicators (IOB, IOC, TTP, IOA)](https://vuldb.com/?ctiid.282561)
3. [Submit #434445 | Codezips Pet Shop Management System In PHP With Source Code V1.0 SQL Injection](https://vuldb.com/?submit.434445)
4. [](https://github.com/ppp-src/CVE/issues/29)
### Credits
- sirslw (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-1099, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-1099 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-1099
- **State**: PUBLISHED
- **Published Date**: March 09, 2002 at 05:00 UTC
- **Last Updated**: August 01, 2024 at 17:02 UTC
- **Reserved Date**: August 31, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Kerberos 4 allows remote attackers to obtain sensitive information via a malformed UDP packet that generates an error string that inadvertently includes the realm name and the last user.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [19961122 L0pht Kerberos Advisory](http://marc.info/?l=bugtraq&m=87602167420184&w=2)
2. [kerberos-user-grab(65)](https://exchange.xforce.ibmcloud.com/vulnerabilities/65) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-8143, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-8143 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-8143
- **State**: REJECTED
- **Published Date**: March 01, 2021 at 23:08 UTC
- **Last Updated**: March 01, 2021 at 23:08 UTC
- **Reserved Date**: September 09, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-9101, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-9101 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-9101
- **State**: PUBLISHED
- **Published Date**: July 17, 2020 at 23:05 UTC
- **Last Updated**: August 04, 2024 at 10:19 UTC
- **Reserved Date**: February 18, 2020 at 00:00 UTC
- **Assigned By**: huawei
### Vulnerability Description
There is an out-of-bounds write vulnerability in some products. An unauthenticated attacker crafts malformed packets with specific parameter and sends the packets to the affected products. Due to insufficient validation of packets, which may be exploited to cause the process reboot. Affected product versions include: IPS Module versions V500R005C00, V500R005C10; NGFW Module versions V500R005C00, V500R005C10; Secospace USG6300 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6500 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; Secospace USG6600 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10; USG9500 versions V500R001C30, V500R001C60, V500R005C00, V500R005C10
### Affected Products
**Huawei - IPS Module**
Affected versions:
- V500R005C00 (Status: affected)
- V500R005C10 (Status: affected)
**Huawei - NGFW Module**
Affected versions:
- V500R005C00 (Status: affected)
- V500R005C10 (Status: affected)
**Huawei - Secospace USG6300**
Affected versions:
- V500R001C30 (Status: affected)
- V500R001C60 (Status: affected)
- V500R005C00 (Status: affected)
- V500R005C10 (Status: affected)
**Huawei - Secospace USG6500**
Affected versions:
- V500R001C30 (Status: affected)
- V500R001C60 (Status: affected)
- V500R005C00 (Status: affected)
- V500R005C10 (Status: affected)
**Huawei - Secospace USG6600**
Affected versions:
- V500R001C30 (Status: affected)
- V500R001C60 (Status: affected)
- V500R005C00 (Status: affected)
- V500R005C10 (Status: affected)
**Huawei - USG9500**
Affected versions:
- V500R001C30 (Status: affected)
- V500R001C60 (Status: affected)
- V500R005C00 (Status: affected)
- V500R005C10 (Status: affected)
### References
1. [](https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200715-01-outofboundswrite-en) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-42488, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-42488 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-42488
- **State**: PUBLISHED
- **Published Date**: October 25, 2023 at 14:37 UTC
- **Last Updated**: September 17, 2024 at 13:40 UTC
- **Reserved Date**: September 11, 2023 at 07:58 UTC
- **Assigned By**: INCD
### Vulnerability Description
EisBaer Scada - CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
### CVSS Metrics
- **CVSS Base Score**: 7.5/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-22: Path Traversal
### Affected Products
** EisBaer Scada - v3.0.6433.1964**
Affected versions:
- All versions (Status: affected)
### References
1. [](https://www.gov.il/en/Departments/faq/cve_advisories) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-23130, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-23130 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-23130
- **State**: PUBLISHED
- **Published Date**: January 21, 2022 at 18:17 UTC
- **Last Updated**: August 03, 2024 at 03:36 UTC
- **Reserved Date**: January 11, 2022 at 00:00 UTC
- **Assigned By**: Mitsubishi
### Vulnerability Description
Buffer Over-read vulnerability in Mitsubishi Electric MC Works64 versions 4.00A (10.95.201.23) to 4.04E (10.95.210.01), ICONICS GENESIS64 versions 10.97 and prior and ICONICS Hyper Historian versions 10.97 and prior allows an attacker to cause a DoS condition in the database server by getting a legitimate user to import a configuration file containing specially crafted stored procedures into GENESIS64 or MC Works64 and execute commands against the database from GENESIS64 or MC Works64.
### Affected Products
**n/a - Mitsubishi Electric MC Works64; ICONICS GENESIS64; ICONICS Hyper Historian**
Affected versions:
- Mitsubishi Electric MC Works64 versions 4.00A (10.95.201.23) to 4.04E (10.95.210.01) (Status: affected)
- ICONICS GENESIS64 versions 10.97 and prior (Status: affected)
- ICONICS Hyper Historian versions 10.97 and prior (Status: affected)
### References
1. [](https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-028_en.pdf)
2. [](https://jvn.jp/vu/JVNVU95403720/index.html)
3. [](https://us-cert.cisa.gov/ics/advisories/icsa-22-020-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-25684, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-25684 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-25684
- **State**: PUBLISHED
- **Published Date**: March 17, 2025 at 00:00 UTC
- **Last Updated**: March 19, 2025 at 19:33 UTC
- **Reserved Date**: February 07, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
A lack of validation in the path parameter (/download) of GL-INet Beryl AX GL-MT3000 v4.7.0 allows attackers to download arbitrary files from the device's file system via a crafted POST request.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://medium.com/@tfortinsec/multiple-path-traversal-vulnerabilities-in-the-beryl-ax-gl-mt300-router-e7f856d14af9) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-2383, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-2383 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-2383
- **State**: PUBLISHED
- **Published Date**: April 28, 2014 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 10:14 UTC
- **Reserved Date**: March 13, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
dompdf.php in dompdf before 0.6.1, when DOMPDF_ENABLE_PHP is enabled, allows context-dependent attackers to bypass chroot protections and read arbitrary files via a PHP protocol and wrappers in the input_file parameter, as demonstrated by a php://filter/read=convert.base64-encode/resource in the input_file parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2383/)
2. [](https://github.com/dompdf/dompdf/commit/23a693993299e669306929e3d49a4a1f7b3fb028)
3. [20140423 CVE-2014-2383 - Arbitrary file read in dompdf](http://seclists.org/fulldisclosure/2014/Apr/258)
4. [20140423 CVE-2014-2383 - Arbitrary file read in dompdf](http://www.securityfocus.com/archive/1/531912/100/0/threaded)
5. [](https://explore.avertium.com/resource/lfi-rfi-escalation-to-rce) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-3559, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-3559 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-3559
- **State**: PUBLISHED
- **Published Date**: July 08, 2023 at 14:31 UTC
- **Last Updated**: October 23, 2024 at 20:02 UTC
- **Reserved Date**: July 08, 2023 at 11:55 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as problematic was found in GZ Scripts PHP GZ Appointment Scheduling Script 1.8. Affected by this vulnerability is an unknown functionality of the file /load.php. The manipulation of the argument first_name/second_name/phone/address_1/country leads to cross site scripting. The attack can be launched remotely. The identifier VDB-233353 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
### CVSS Metrics
- **CVSS Base Score**: 3.5/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**GZ Scripts - PHP GZ Appointment Scheduling Script**
Affected versions:
- 1.8 (Status: affected)
### References
1. [](https://vuldb.com/?id.233353)
2. [](https://vuldb.com/?ctiid.233353)
### Credits
- skalvin (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-12173, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-12173 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-12173
- **State**: PUBLISHED
- **Published Date**: July 27, 2018 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 18:28 UTC
- **Reserved Date**: August 01, 2017 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
It was found that sssd's sysdb_search_user_by_upn_res() function before 1.16.0 did not sanitize requests when querying its local cache and was vulnerable to injection. In a centralized login environment, if a password hash was locally cached for a given user, an authenticated attacker could use this flaw to retrieve it.
### Weakness Classification (CWE)
- CWE-20: Improper Input Validation
### Affected Products
**SSSD - sssd**
Affected versions:
- 1.16.0 (Status: affected)
### References
1. [RHSA-2017:3379](https://access.redhat.com/errata/RHSA-2017:3379)
2. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12173)
3. [RHSA-2018:1877](https://access.redhat.com/errata/RHSA-2018:1877) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-47370, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-47370 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-47370
- **State**: PUBLISHED
- **Published Date**: November 09, 2023 at 00:00 UTC
- **Last Updated**: September 03, 2024 at 18:56 UTC
- **Reserved Date**: November 06, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The leakage of channel access token in bluetrick Line 13.6.1 allows remote attackers to send malicious notifications to victims.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/syz913/CVE-reports/blob/main/bluetrick.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-26900, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-26900 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-26900
- **State**: PUBLISHED
- **Published Date**: April 17, 2024 at 10:27 UTC
- **Last Updated**: May 04, 2025 at 08:59 UTC
- **Reserved Date**: February 19, 2024 at 14:20 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
md: fix kmemleak of rdev->serial
If kobject_add() is fail in bind_rdev_to_array(), 'rdev->serial' will be
alloc not be freed, and kmemleak occurs.
unreferenced object 0xffff88815a350000 (size 49152):
comm "mdadm", pid 789, jiffies 4294716910
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace (crc f773277a):
[<0000000058b0a453>] kmemleak_alloc+0x61/0xe0
[<00000000366adf14>] __kmalloc_large_node+0x15e/0x270
[<000000002e82961b>] __kmalloc_node.cold+0x11/0x7f
[<00000000f206d60a>] kvmalloc_node+0x74/0x150
[<0000000034bf3363>] rdev_init_serial+0x67/0x170
[<0000000010e08fe9>] mddev_create_serial_pool+0x62/0x220
[<00000000c3837bf0>] bind_rdev_to_array+0x2af/0x630
[<0000000073c28560>] md_add_new_disk+0x400/0x9f0
[<00000000770e30ff>] md_ioctl+0x15bf/0x1c10
[<000000006cfab718>] blkdev_ioctl+0x191/0x3f0
[<0000000085086a11>] vfs_ioctl+0x22/0x60
[<0000000018b656fe>] __x64_sys_ioctl+0xba/0xe0
[<00000000e54e675e>] do_syscall_64+0x71/0x150
[<000000008b0ad622>] entry_SYSCALL_64_after_hwframe+0x6c/0x74
### Affected Products
**Linux - Linux**
Affected versions:
- 963c555e75b033202dd76cf6325a7b7c83d08d5f (Status: affected)
- 963c555e75b033202dd76cf6325a7b7c83d08d5f (Status: affected)
- 963c555e75b033202dd76cf6325a7b7c83d08d5f (Status: affected)
- 963c555e75b033202dd76cf6325a7b7c83d08d5f (Status: affected)
- 963c555e75b033202dd76cf6325a7b7c83d08d5f (Status: affected)
- 963c555e75b033202dd76cf6325a7b7c83d08d5f (Status: affected)
- 963c555e75b033202dd76cf6325a7b7c83d08d5f (Status: affected)
**Linux - Linux**
Affected versions:
- 5.3 (Status: affected)
- 0 (Status: unaffected)
- 5.10.217 (Status: unaffected)
- 5.15.159 (Status: unaffected)
- 6.1.91 (Status: unaffected)
- 6.6.31 (Status: unaffected)
- 6.7.11 (Status: unaffected)
- 6.8.2 (Status: unaffected)
- 6.9 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/fb5b347efd1bda989846ffc74679d181222fb123)
2. [](https://git.kernel.org/stable/c/f3a1787dc48213f6caea5ba7d47e0222e7fa34a9)
3. [](https://git.kernel.org/stable/c/beaf11969fd5cbe6f09cefaa34df1ce8578e8dd9)
4. [](https://git.kernel.org/stable/c/9fd0198f7ef06ae0d6636fb0578560857dead995)
5. [](https://git.kernel.org/stable/c/6d32c832a88513f65c2c2c9c75954ee8b387adea)
6. [](https://git.kernel.org/stable/c/4c1021ce46fc2fb6115f7e79d353941e6dcad366)
7. [](https://git.kernel.org/stable/c/6cf350658736681b9d6b0b6e58c5c76b235bb4c4) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-18153, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-18153 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-18153
- **State**: REJECTED
- **Last Updated**: February 27, 2023 at 00:00 UTC
- **Reserved Date**: October 09, 2018 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-33390, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-33390 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-33390
- **State**: PUBLISHED
- **Published Date**: August 22, 2023 at 00:00 UTC
- **Last Updated**: October 03, 2024 at 18:19 UTC
- **Reserved Date**: May 20, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
dpic 2021.04.10 has a use-after-free in thedeletestringbox() function in dpic.y. A different vulnerablility than CVE-2021-32421.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://gitlab.com/aplevich/dpic/-/issues/10) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-0249, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-0249 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-0249
- **State**: PUBLISHED
- **Published Date**: May 24, 2001 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 04:14 UTC
- **Reserved Date**: March 22, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Heap overflow in FTP daemon in Solaris 8 allows remote attackers to execute arbitrary commands by creating a long pathname and calling the LIST command, which uses glob to generate long strings.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20010409 Globbing Vulnerabilities in Multiple FTP Daemons](http://www.nai.com/research/covert/advisories/048.asp)
2. [CA-2001-07](http://www.cert.org/advisories/CA-2001-07.html)
3. [2550](http://www.securityfocus.com/bid/2550)
4. [ftp-glob-expansion(6332)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6332) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-1999-1563, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-1999-1563 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-1999-1563
- **State**: PUBLISHED
- **Published Date**: September 12, 2001 at 04:00 UTC
- **Last Updated**: August 01, 2024 at 17:18 UTC
- **Reserved Date**: August 31, 2001 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Nachuatec D435 and D445 printer allows remote attackers to cause a denial of service via ICMP redirect storm.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [19991014 NEUROCOM: Nashuatec printer, 3 vulnerabilities found](http://www.securityfocus.com/archive/1/30849)
2. [19991116 NEUROCOM: Nashuatec D445/435 vulnerabilities updated](http://www.securityfocus.com/archive/1/35075) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-4766, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-4766 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-4766
- **State**: PUBLISHED
- **Published Date**: September 14, 2023 at 18:12 UTC
- **Last Updated**: September 25, 2024 at 19:30 UTC
- **Reserved Date**: September 05, 2023 at 08:30 UTC
- **Assigned By**: TR-CERT
### Vulnerability Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Movus allows SQL Injection.This issue affects Movus: before 20230913.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-89: SQL Injection
### Affected Products
**Movus - Movus**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.usom.gov.tr/bildirim/tr-23-0524)
### Credits
- Omer Kaan COSKUN |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-27343, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-27343 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-27343
- **State**: PUBLISHED
- **Published Date**: April 17, 2025 at 15:47 UTC
- **Last Updated**: April 17, 2025 at 18:22 UTC
- **Reserved Date**: February 21, 2025 at 16:46 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Webilop WooCommerce HTML5 Video allows Reflected XSS. This issue affects WooCommerce HTML5 Video: from n/a through 1.7.10.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Webilop - WooCommerce HTML5 Video**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/wordpress/plugin/woocommerce-html5-video/vulnerability/wordpress-woocommerce-html5-video-plugin-1-7-10-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- Nguyen Xuan Chien (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-0644, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-0644 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-0644
- **State**: PUBLISHED
- **Published Date**: April 17, 2014 at 01:00 UTC
- **Last Updated**: August 06, 2024 at 09:20 UTC
- **Reserved Date**: January 02, 2014 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
EMC Cloud Tiering Appliance (CTA) 10 through SP1 allows remote attackers to read arbitrary files via an api/login request containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, as demonstrated by reading the /etc/shadow file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20140416 ESA-2014-028: EMC Cloud Tiering Appliance XML External Entity (XXE) and Information Disclosure Vulnerabilities](http://archives.neohapsis.com/archives/bugtraq/2014-04/0094.html)
2. [](https://gist.github.com/brandonprry/9895721)
3. [20140331 EMC CTA v10.0 unauthenticated XXE with root perms](http://seclists.org/fulldisclosure/2014/Mar/426) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-1606, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-1606 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-1606
- **State**: PUBLISHED
- **Published Date**: November 30, 2022 at 14:05 UTC
- **Last Updated**: August 28, 2024 at 18:09 UTC
- **Reserved Date**: May 06, 2022 at 13:03 UTC
- **Assigned By**: M-Files Corporation
### Vulnerability Description
Incorrect privilege assignment in M-Files Server versions before 22.3.11164.0 and before 22.3.11237.1 allows user to read unmanaged objects.
### CVSS Metrics
- **CVSS Base Score**: 2.4/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-269: Security Weakness
### Affected Products
**M-Files - M-Files Server**
Affected versions:
- 0 (Status: affected)
- 0 (Status: affected)
### References
1. [](https://www.m-files.com/about/trust-center/security-advisories/cve-2022-1606/)
2. [](https://product.m-files.com/security-advisories/cve-2022-1606/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-38387, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-38387 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-38387
- **State**: PUBLISHED
- **Published Date**: September 03, 2023 at 11:13 UTC
- **Last Updated**: September 24, 2024 at 18:57 UTC
- **Reserved Date**: July 17, 2023 at 15:21 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Elastic Email Sender plugin <= 1.2.6 versions.
### CVSS Metrics
- **CVSS Base Score**: 5.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Elastic Email Sender - Elastic Email Sender**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/elastic-email-sender/wordpress-elastic-email-sender-plugin-1-2-6-cross-site-scripting-xss?_s_id=cve)
### Credits
- yuyudhn (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-47942, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-47942 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-47942
- **State**: PUBLISHED
- **Published Date**: May 21, 2025 at 21:15 UTC
- **Last Updated**: May 22, 2025 at 15:04 UTC
- **Reserved Date**: May 14, 2025 at 10:32 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
The Open edX Platform is a learning management platform. Prior to commit 6740e75c0fdc7ba095baf88e9f5e4f3e15cfd8ba, edxapp has no built-in protection against downloading the python_lib.zip asset from courses, which is a concern since it often contains custom grading code or answers to course problems. This potentially affects any course using custom Python-graded problem blocks. The openedx/configuration repo has had a patch since 2016 in the form of an nginx rule, but this was only intended as a temporary mitigation. As the configuration repo has been deprecated and we have not been able to locate any similar protection in Tutor, it is likely that most deployments have no protection against python_lib.zip being downloaded. The recommended mitigation, implemented in commit 6740e75c0fdc7ba095baf88e9f5e4f3e15cfd8ba, restricts python_lib.zip downloads to just the course team and site staff/superusers.
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Weakness Classification (CWE)
- CWE-862: Missing Authorization
### Affected Products
**openedx - edx-platform**
Affected versions:
- < 6740e75c0fdc7ba095baf88e9f5e4f3e15cfd8ba (Status: affected)
### References
1. [https://github.com/openedx/edx-platform/security/advisories/GHSA-x5cm-2hpq-pw57](https://github.com/openedx/edx-platform/security/advisories/GHSA-x5cm-2hpq-pw57)
2. [https://github.com/openedx/edx-platform/commit/6740e75c0fdc7ba095baf88e9f5e4f3e15cfd8ba](https://github.com/openedx/edx-platform/commit/6740e75c0fdc7ba095baf88e9f5e4f3e15cfd8ba)
3. [https://github.com/edx/configuration/blob/3471fc036a6664cedd3e2d78403dca73bc1cda51/playbooks/roles/nginx/templates/edx/app/nginx/sites-available/python_lib.zip.j2](https://github.com/edx/configuration/blob/3471fc036a6664cedd3e2d78403dca73bc1cda51/playbooks/roles/nginx/templates/edx/app/nginx/sites-available/python_lib.zip.j2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-26332, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-26332 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-26332
- **State**: PUBLISHED
- **Published Date**: March 01, 2022 at 00:46 UTC
- **Last Updated**: August 03, 2024 at 05:03 UTC
- **Reserved Date**: March 01, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cipi 3.1.15 allows Add Server stored XSS via the /api/servers name field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.exploit-db.com/exploits/50788)
2. [](https://github.com/andreapollastri/cipi/releases) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-7181, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-7181 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-7181
- **State**: PUBLISHED
- **Published Date**: October 16, 2014 at 19:00 UTC
- **Last Updated**: August 06, 2024 at 12:40 UTC
- **Reserved Date**: September 25, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the Max Foundry MaxButtons plugin before 1.26.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the id parameter in a button action on the maxbuttons-controller page to wp-admin/admin.php, related to the button creation page.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/128693/WordPress-MaxButtons-1.26.0-Cross-Site-Scripting.html)
2. [20141015 Reflected Cross-Site Scripting (XSS) in MaxButtons WordPress Plugin](http://www.securityfocus.com/archive/1/533700/100/0/threaded)
3. [](https://wordpress.org/plugins/maxbuttons/changelog)
4. [](https://www.htbridge.com/advisory/HTB23237) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-12489, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-12489 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-12489
- **State**: PUBLISHED
- **Published Date**: February 15, 2018 at 22:00 UTC
- **Last Updated**: September 16, 2024 at 18:50 UTC
- **Reserved Date**: August 05, 2017 at 00:00 UTC
- **Assigned By**: hpe
### Vulnerability Description
A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version.
### Affected Products
**Hewlett Packard Enterprise - Intelligent Management Center (iMC) PLAT**
Affected versions:
- PLAT 7.3 (E0504) (Status: affected)
### References
1. [1039152](http://www.securitytracker.com/id/1039152)
2. [100367](http://www.securityfocus.com/bid/100367)
3. [](https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03768en_us) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-34455, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-34455 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-34455
- **State**: PUBLISHED
- **Published Date**: July 16, 2021 at 20:19 UTC
- **Last Updated**: August 04, 2024 at 00:12 UTC
- **Reserved Date**: June 09, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows File History Service Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 21H1**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34455) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-8221, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-8221 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-8221
- **State**: PUBLISHED
- **Published Date**: April 25, 2017 at 20:00 UTC
- **Last Updated**: September 16, 2024 at 17:59 UTC
- **Reserved Date**: April 25, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Wireless IP Camera (P2P) WIFICAM devices rely on a cleartext UDP tunnel protocol (aka the Cloud feature) for communication between an Android application and a camera device, which allows remote attackers to obtain sensitive information by sniffing the network.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html#cloud)
2. [](http://seclists.org/fulldisclosure/2017/Mar/23) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-17371, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-17371 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-17371
- **State**: REJECTED
- **Published Date**: November 05, 2020 at 23:06 UTC
- **Last Updated**: November 05, 2020 at 23:06 UTC
- **Reserved Date**: December 04, 2017 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-46998, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-46998 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-46998
- **State**: PUBLISHED
- **Published Date**: November 07, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 21:01 UTC
- **Reserved Date**: October 30, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross Site Scripting vulnerability in BootBox Bootbox.js v.3.2 through 6.0 allows a remote attacker to execute arbitrary code via a crafted payload to alert(), confirm(), prompt() functions.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/bootboxjs/bootbox/issues/661)
2. [](https://github.com/soy-oreocato/CVE-2023-46998/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-2929, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-2929 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2929
- **State**: PUBLISHED
- **Published Date**: October 07, 2022 at 04:45 UTC
- **Last Updated**: September 16, 2024 at 18:28 UTC
- **Reserved Date**: August 22, 2022 at 00:00 UTC
- **Assigned By**: isc
### Vulnerability Description
In ISC DHCP 1.0 -> 4.4.3, ISC DHCP 4.1-ESV-R1 -> 4.1-ESV-R16-P1 a system with access to a DHCP server, sending DHCP packets crafted to include fqdn labels longer than 63 bytes, could eventually cause the server to run out of memory.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`
### Affected Products
**ISC - ISC DHCP**
Affected versions:
- 1.0 through versions before 4.1-ESV-R16-P2 (Status: affected)
- 4.2 through versions before 4.4.3.-P1 (Status: affected)
### References
1. [](https://kb.isc.org/docs/cve-2022-2929)
2. [[debian-lts-announce] 20221010 [SECURITY] [DLA 3146-1] isc-dhcp security update](https://lists.debian.org/debian-lts-announce/2022/10/msg00015.html)
3. [FEDORA-2022-f5a45757df](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQXYCIWUDILRCNBAIMVFCSGXBRKEPB4K/)
4. [FEDORA-2022-9ca9a94e28](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T6IBFH4MRRNJQVWEKILQ6I6CXWW766FX/)
5. [FEDORA-2022-c4f274a54f](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2SARIK7KZ7MGQIWDRWZFAOSQSPXY4GOU/)
6. [GLSA-202305-22](https://security.gentoo.org/glsa/202305-22)
### Credits
- ISC would like to thank VictorV of Cyber Kunlun Lab for discovering and reporting this issue. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-0077, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-0077 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-0077
- **State**: PUBLISHED
- **Published Date**: January 29, 2005 at 05:00 UTC
- **Last Updated**: August 07, 2024 at 20:57 UTC
- **Reserved Date**: January 14, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The DBI library (libdbi-perl) for Perl allows local users to overwrite arbitrary files via a symlink attack on a temporary PID file.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1013007](http://securitytracker.com/id?1013007)
2. [FLSA-2006:178989](http://www.securityfocus.com/archive/1/426530/30/6600/threaded)
3. [MDKSA-2005:030](http://www.mandriva.com/security/advisories?name=MDKSA-2005:030)
4. [dbi-library-file-overwrite(19068)](https://exchange.xforce.ibmcloud.com/vulnerabilities/19068)
5. [DSA-658](http://www.debian.org/security/2005/dsa-658)
6. [14015](http://secunia.com/advisories/14015)
7. [oval:org.mitre.oval:def:10552](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10552)
8. [12360](http://www.securityfocus.com/bid/12360)
9. [GLSA-200501-38](http://www.gentoo.org/security/en/glsa/glsa-200501-38.xml)
10. [14050](http://secunia.com/advisories/14050)
11. [RHSA-2005:072](http://www.redhat.com/support/errata/RHSA-2005-072.html)
12. [20050125 [USN-70-1] Perl DBI module vulnerability](http://marc.info/?l=bugtraq&m=110667936707597&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-22410, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-22410 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-22410
- **State**: PUBLISHED
- **Published Date**: January 17, 2024 at 20:22 UTC
- **Last Updated**: November 13, 2024 at 19:49 UTC
- **Reserved Date**: January 10, 2024 at 15:09 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Creditcoin is a network that enables cross-blockchain credit transactions. The Windows binary of the Creditcoin node loads a suite of DLLs provided by Microsoft at startup. If a malicious user has access to overwrite the program files directory it is possible to replace these DLLs and execute arbitrary code. It is the view of the blockchain development team that the threat posed by a hypothetical binary planting attack is minimal and represents a low-security risk. The vulnerable DLL files are from the Windows networking subsystem, the Visual C++ runtime, and low-level cryptographic primitives. Collectively these dependencies are required for a large ecosystem of applications, ranging from enterprise-level security applications to game engines, and don’t represent a fundamental lack of security or oversight in the design and implementation of Creditcoin. The blockchain team takes the stance that running Creditcoin on Windows is officially unsupported and at best should be thought of as experimental.
### CVSS Metrics
- **CVSS Base Score**: 3.3/10.0
- **Severity**: LOW
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L`
### Weakness Classification (CWE)
- CWE-426: Security Weakness
### Affected Products
**gluwa - creditcoin**
Affected versions:
- * (Status: affected)
### References
1. [https://github.com/gluwa/creditcoin/security/advisories/GHSA-cx5c-xwcv-vhmq](https://github.com/gluwa/creditcoin/security/advisories/GHSA-cx5c-xwcv-vhmq)
2. [https://owasp.org/www-community/attacks/Binary_planting](https://owasp.org/www-community/attacks/Binary_planting) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-4836, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-4836 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-4836
- **State**: PUBLISHED
- **Published Date**: October 21, 2015 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 06:25 UTC
- **Reserved Date**: June 24, 2015 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : SP.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [openSUSE-SU-2015:2244](http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html)
2. [RHSA-2016:1481](http://rhn.redhat.com/errata/RHSA-2016-1481.html)
3. [1033894](http://www.securitytracker.com/id/1033894)
4. [RHSA-2016:1132](https://access.redhat.com/errata/RHSA-2016:1132)
5. [RHSA-2016:0534](http://rhn.redhat.com/errata/RHSA-2016-0534.html)
6. [USN-2781-1](http://www.ubuntu.com/usn/USN-2781-1)
7. [SUSE-SU-2016:0296](https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html)
8. [](http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html)
9. [](http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html)
10. [RHSA-2016:1480](http://rhn.redhat.com/errata/RHSA-2016-1480.html)
11. [openSUSE-SU-2015:2246](http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html)
12. [DSA-3385](http://www.debian.org/security/2015/dsa-3385)
13. [](http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html)
14. [openSUSE-SU-2016:0368](http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html)
15. [77190](http://www.securityfocus.com/bid/77190)
16. [DSA-3377](http://www.debian.org/security/2015/dsa-3377)
17. [RHSA-2016:0705](http://rhn.redhat.com/errata/RHSA-2016-0705.html)
18. [FEDORA-2016-e30164d0a2](http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-0914, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-0914 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-0914
- **State**: PUBLISHED
- **Published Date**: April 11, 2022 at 14:40 UTC
- **Last Updated**: August 02, 2024 at 23:47 UTC
- **Reserved Date**: March 10, 2022 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Export All URLs WordPress plugin before 4.3 does not have CSRF in place when exporting data, which could allow attackers to make a logged in admin export all posts and pages (including private and draft) into an arbitrary CSV file, which the attacker can then download and retrieve the list of titles for example
### Weakness Classification (CWE)
- CWE-352: Cross-Site Request Forgery (CSRF)
### Affected Products
**Unknown - Export All URLs**
Affected versions:
- 4.3 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/c328be28-75dd-43db-a5b9-c1ba0636c930)
### Credits
- Asif Nawaz Minhas |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-1956, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-1956 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-1956
- **State**: PUBLISHED
- **Published Date**: April 30, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 09:58 UTC
- **Reserved Date**: February 12, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
CRLF injection vulnerability in FortiGuard FortiWeb before 5.0.3 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.fortiguard.com/advisory/FG-IR-13-009/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-28476, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-28476 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-28476
- **State**: PUBLISHED
- **Published Date**: May 11, 2021 at 19:11 UTC
- **Last Updated**: August 03, 2024 at 21:47 UTC
- **Reserved Date**: March 15, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Hyper-V Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 9.9/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1803**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server, version 1909 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
- 6.1.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.0.0 (Status: affected)
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28476)
2. [](http://packetstormsecurity.com/files/163497/Microsoft-Hyper-V-vmswitch.sys-Proof-Of-Concept.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-5874, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-5874 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-5874
- **State**: PUBLISHED
- **Published Date**: December 04, 2023 at 21:28 UTC
- **Last Updated**: November 21, 2024 at 19:21 UTC
- **Reserved Date**: October 31, 2023 at 09:31 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The Popup box WordPress plugin before 3.8.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
### Weakness Classification (CWE)
- CWE-79 Cross-Site Scripting (XSS): Cross-site Scripting (XSS)
### Affected Products
**Unknown - Popup box**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/ebe3e873-1259-43b9-a027-daa4dbd937f3)
### Credits
- Bob Matyas
- WPScan |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-2447, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-2447 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-2447
- **State**: PUBLISHED
- **Published Date**: November 07, 2019 at 19:32 UTC
- **Last Updated**: August 07, 2024 at 02:32 UTC
- **Reserved Date**: June 24, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
gitolite before 1.4.1 does not filter src/ or hooks/ from path names.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://security-tracker.debian.org/tracker/CVE-2010-2447)
2. [[oss-security] 20100624 Re: CVE requests: maradns, freeciv, rbot, gitolite, gource, shib, kvirc](https://www.openwall.com/lists/oss-security/2010/06/24/5)
3. [](https://github.com/sitaramc/gitolite/commit/1e06fea3b6959faeb72d8dca46cd4753ada48637)
4. [](https://github.com/sitaramc/gitolite/commit/5fd9328c1cd1e7c576b6530b3253061c68b159aa)
5. [](https://github.com/sitaramc/gitolite/releases/tag/v1.4.1) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-23461, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-23461 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-23461
- **State**: PUBLISHED
- **Published Date**: February 15, 2023 at 00:00 UTC
- **Last Updated**: March 19, 2025 at 19:02 UTC
- **Reserved Date**: January 12, 2023 at 00:00 UTC
- **Assigned By**: INCD
### Vulnerability Description
Libpeconv – access violation, before commit b076013 (30/11/2022).
### Affected Products
**Hasherezade (github) - Libpeconv**
Affected versions:
- before commit b076013 (30/11/2022). (Status: affected)
### References
1. [](https://www.gov.il/en/Departments/faq/cve_advisories)
### Credits
- Tomer Dricker |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-20002, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-20002 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-20002
- **State**: PUBLISHED
- **Published Date**: March 17, 2021 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 21:45 UTC
- **Reserved Date**: March 17, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Debian shadow package before 1:4.5-1 for Shadow incorrectly lists pts/0 and pts/1 as physical terminals in /etc/securetty. This allows local users to login as password-less users even if they are connected by non-physical means such as SSH (hence bypassing PAM's nullok_secure configuration). This notably affects environments such as virtual machines automatically generated with a default blank root password, allowing all local users to escalate privileges.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877374)
2. [](https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914957)
3. [[debian-lts-announce] 20210317 [SECURITY] [DLA 2596-1] shadow security update](https://lists.debian.org/debian-lts-announce/2021/03/msg00020.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-20046, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-20046 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-20046
- **State**: PUBLISHED
- **Published Date**: January 07, 2022 at 03:00 UTC
- **Last Updated**: August 03, 2024 at 17:30 UTC
- **Reserved Date**: December 17, 2020 at 00:00 UTC
- **Assigned By**: sonicwall
### Vulnerability Description
A Stack-based buffer overflow in the SonicOS HTTP Content-Length response header allows a remote authenticated attacker to cause Denial of Service (DoS) and potentially results in code execution in the firewall. This vulnerability affected SonicOS Gen 5, Gen 6 and Gen 7 firmware versions.
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**SonicWall - SonicOS**
Affected versions:
- 7.0.1-R146 and earlier (Status: affected)
- 7.0.1-5023-1349 and earlier (Status: affected)
- 7.0.1-5018-R1715 and earlier (Status: affected)
- 6.5.4.8-89n and earlier (Status: affected)
- 6.5.1.13-1n and earlier (Status: affected)
- 6.0.5.3-94o and earlier (Status: affected)
- 6.5.4.v_21s-1288 and earlier (Status: affected)
- 5.9.1.13 and earlier (Status: affected)
### References
1. [](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0027) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1784, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1784 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1784
- **State**: PUBLISHED
- **Published Date**: December 20, 2018 at 14:00 UTC
- **Last Updated**: September 16, 2024 at 22:09 UTC
- **Reserved Date**: December 13, 2017 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM API Connect 5.0.0.0 and 5.0.8.4 is affected by a NoSQL Injection in MongoDB connector for the LoopBack framework. IBM X-Force ID: 148807.
### Affected Products
**IBM - API Connect**
Affected versions:
- 5.0.0.0 (Status: affected)
- 5.0.8.4 (Status: affected)
### References
1. [106316](http://www.securityfocus.com/bid/106316)
2. [](http://www.ibm.com/support/docview.wss?uid=ibm10737883)
3. [ibm-api-cve20181784-nosql-injection(148807)](https://exchange.xforce.ibmcloud.com/vulnerabilities/148807) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-32721, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-32721 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-32721
- **State**: REJECTED
- **Last Updated**: May 29, 2023 at 00:00 UTC
- **Reserved Date**: June 09, 2022 at 00:00 UTC
- **Assigned By**: MediaTek
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-2800, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-2800 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-2800
- **State**: PUBLISHED
- **Published Date**: July 07, 2008 at 23:00 UTC
- **Last Updated**: August 07, 2024 at 09:14 UTC
- **Reserved Date**: June 20, 2008 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 allow remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via vectors involving (1) an event handler attached to an outer window, (2) a SCRIPT element in an unloaded document, or (3) the onreadystatechange handler in conjunction with an XMLHttpRequest.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [SUSE-SA:2008:034](http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00004.html)
2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=433328)
3. [RHSA-2008:0549](http://www.redhat.com/support/errata/RHSA-2008-0549.html)
4. [DSA-1697](http://www.debian.org/security/2009/dsa-1697)
5. [](http://www.mozilla.org/security/announce/2008/mfsa2008-22.html)
6. [31021](http://secunia.com/advisories/31021)
7. [oval:org.mitre.oval:def:9386](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9386)
8. [30898](http://secunia.com/advisories/30898)
9. [](http://wiki.rpath.com/Advisories:rPSA-2008-0216)
10. [](https://issues.rpath.com/browse/RPL-2646)
11. [30949](http://secunia.com/advisories/30949)
12. [SSA:2008-191-03](http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.383152)
13. [ADV-2009-0977](http://www.vupen.com/english/advisories/2009/0977)
14. [31069](http://secunia.com/advisories/31069)
15. [31008](http://secunia.com/advisories/31008)
16. [31377](http://secunia.com/advisories/31377)
17. [RHSA-2008:0616](http://rhn.redhat.com/errata/RHSA-2008-0616.html)
18. [ADV-2008-1993](http://www.vupen.com/english/advisories/2008/1993/references)
19. [31023](http://secunia.com/advisories/31023)
20. [30038](http://www.securityfocus.com/bid/30038)
21. [DSA-1607](http://www.debian.org/security/2008/dsa-1607)
22. [GLSA-200808-03](http://security.gentoo.org/glsa/glsa-200808-03.xml)
23. [31005](http://secunia.com/advisories/31005)
24. [33433](http://secunia.com/advisories/33433)
25. [FEDORA-2008-6127](https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00207.html)
26. [1020419](http://www.securitytracker.com/id?1020419)
27. [](http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15)
28. [31183](http://secunia.com/advisories/31183)
29. [30903](http://secunia.com/advisories/30903)
30. [RHSA-2008:0547](http://www.redhat.com/support/errata/RHSA-2008-0547.html)
31. [FEDORA-2008-6193](https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00288.html)
32. [256408](http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1)
33. [](https://bugzilla.mozilla.org/show_bug.cgi?id=439035)
34. [SSA:2008-191](http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.384911)
35. [](https://bugzilla.mozilla.org/show_bug.cgi?id=428672)
36. [DSA-1615](http://www.debian.org/security/2008/dsa-1615)
37. [31195](http://secunia.com/advisories/31195)
38. [31076](http://secunia.com/advisories/31076)
39. [USN-619-1](http://www.ubuntu.com/usn/usn-619-1)
40. [30911](http://secunia.com/advisories/30911)
41. [RHSA-2008:0569](http://www.redhat.com/support/errata/RHSA-2008-0569.html)
42. [30878](http://secunia.com/advisories/30878)
43. [20080708 rPSA-2008-0216-1 firefox](http://www.securityfocus.com/archive/1/494080/100/0/threaded)
44. [FEDORA-2008-6196](https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00295.html)
45. [34501](http://secunia.com/advisories/34501)
46. [](https://bugzilla.mozilla.org/show_bug.cgi?id=432591)
47. [](https://bugzilla.mozilla.org/show_bug.cgi?id=440308)
48. [MDVSA-2008:136](http://www.mandriva.com/security/advisories?name=MDVSA-2008:136) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-5142, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-5142 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-5142
- **State**: PUBLISHED
- **Published Date**: September 28, 2007 at 21:00 UTC
- **Last Updated**: September 16, 2024 at 22:09 UTC
- **Reserved Date**: September 28, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in buscar.asp in Solidweb Novus 1.0 allows remote attackers to inject arbitrary web script or HTML via the p parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [25828](http://www.securityfocus.com/bid/25828) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-0022, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-0022 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-0022
- **State**: PUBLISHED
- **Published Date**: June 13, 2006 at 19:00 UTC
- **Last Updated**: August 07, 2024 at 16:18 UTC
- **Reserved Date**: November 30, 2005 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Unspecified vulnerability in Microsoft PowerPoint in Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP1 and SP2, Office 2004 for Mac, and v. X for Mac allows user-assisted attackers to execute arbitrary code via a PowerPoint document with a malformed record, which triggers memory corruption.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [1016287](http://securitytracker.com/id?1016287)
2. [oval:org.mitre.oval:def:1984](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1984)
3. [TA06-164A](http://www.us-cert.gov/cas/techalerts/TA06-164A.html)
4. [MS06-028](https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-028)
5. [20633](http://secunia.com/advisories/20633)
6. [VU#190089](http://www.kb.cert.org/vuls/id/190089)
7. [oval:org.mitre.oval:def:1069](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1069)
8. [26435](http://www.osvdb.org/26435)
9. [powerpoint-record-bo(26784)](https://exchange.xforce.ibmcloud.com/vulnerabilities/26784)
10. [oval:org.mitre.oval:def:1836](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1836)
11. [ADV-2006-2325](http://www.vupen.com/english/advisories/2006/2325)
12. [18382](http://www.securityfocus.com/bid/18382) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-1903, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-1903 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-1903
- **State**: REJECTED
- **Published Date**: January 05, 2018 at 14:00 UTC
- **Last Updated**: January 05, 2018 at 13:57 UTC
- **Reserved Date**: November 30, 2016 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-5821, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-5821 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-5821
- **State**: PUBLISHED
- **Published Date**: February 11, 2020 at 17:02 UTC
- **Last Updated**: August 04, 2024 at 08:39 UTC
- **Reserved Date**: January 06, 2020 at 00:00 UTC
- **Assigned By**: symantec
### Vulnerability Description
Symantec Endpoint Protection (SEP) and Symantec Endpoint Protection Small Business Edition (SEP SBE), prior to 14.2 RU2 MP1 and prior to 14.2.5569.2100 respectively, may be susceptible to a DLL injection vulnerability, which is a type of issue whereby an individual attempts to execute their own code in place of legitimate code as a means to perform an exploit.
### Affected Products
**n/a - Symantec Endpoint Protection (SEP) and Symantec Endpoint Protection Small Business Edition (SEP SBE)**
Affected versions:
- Prior to 14.2 RU2 MP1 and prior to 14.2.5569.2100 respectively (Status: affected)
### References
1. [](https://support.symantec.com/us/en/article.SYMSA1505.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-4863, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-4863 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-4863
- **State**: PUBLISHED
- **Published Date**: May 22, 2017 at 16:00 UTC
- **Last Updated**: August 06, 2024 at 00:46 UTC
- **Reserved Date**: May 17, 2016 at 00:00 UTC
- **Assigned By**: jpcert
### Vulnerability Description
The Toshiba FlashAir SD-WD/WC series Class 6 model with firmware version 1.00.04 and later, FlashAir SD-WD/WC series Class 10 model W-02 with firmware version 2.00.02 and later, FlashAir SD-WE series Class 10 model W-03, FlashAir Class 6 model with firmware version 1.00.04 and later, FlashAir II Class 10 model W-02 series with firmware version 2.00.02 and later, FlashAir III Class 10 model W-03 series, FlashAir Class 6 model with firmware version 1.00.04 and later, FlashAir W-02 series Class 10 model with firmware version 2.00.02 and later, FlashAir W-03 series Class 10 model does not require authentication on accepting a connection from STA side LAN when "Internet pass-thru Mode" is enabled, which allows attackers with access to STA side LAN can obtain files or data.
### Affected Products
**Toshiba - FlashAir SD-WD/WC series Class 6 model**
Affected versions:
- firmware version 1.00.04 and later (Status: affected)
**Toshiba - FlashAir SD-WD/WC series Class 10 model W-02**
Affected versions:
- firmware version 2.00.02 and later (Status: affected)
**Toshiba - FlashAir SD-WE series Class 10 model W-03**
Affected versions:
- all firmware versions (Status: affected)
**Toshiba - FlashAir Class 6 model**
Affected versions:
- firmware version 1.00.04 and later (Status: affected)
**Toshiba - FlashAir II Class 10 model W-02 series**
Affected versions:
- firmware version 2.00.02 and later (Status: affected)
**Toshiba - FlashAir III Class 10 model W-03 series**
Affected versions:
- all firmware versions (Status: affected)
**Toshiba - FlashAir Class 6 model**
Affected versions:
- firmware version 1.00.04 and later (Status: affected)
**Toshiba - FlashAir W-02 series Class 10 model**
Affected versions:
- firmware version 2.00.02 and later (Status: affected)
**Toshiba - FlashAir W-03 series Class 10 model**
Affected versions:
- all firmware versions (Status: affected)
### References
1. [93479](http://www.securityfocus.com/bid/93479)
2. [JVN#39619137](https://jvn.jp/en/jp/JVN39619137/index.html)
3. [JVNDB-2016-000168](http://jvndb.jvn.jp/jvndb/JVNDB-2016-000168) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-0941, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-0941 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-0941
- **State**: PUBLISHED
- **Published Date**: October 25, 2021 at 13:20 UTC
- **Last Updated**: August 03, 2024 at 15:55 UTC
- **Reserved Date**: November 06, 2020 at 00:00 UTC
- **Assigned By**: google_android
### Vulnerability Description
In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154177719References: Upstream kernel
### Affected Products
**n/a - Android**
Affected versions:
- Android kernel (Status: affected)
### References
1. [](https://source.android.com/security/bulletin/pixel/2021-10-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-33898, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-33898 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-33898
- **State**: PUBLISHED
- **Published Date**: July 12, 2023 at 08:31 UTC
- **Last Updated**: December 03, 2024 at 17:12 UTC
- **Reserved Date**: May 23, 2023 at 06:38 UTC
- **Assigned By**: Unisoc
### Vulnerability Description
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
### Affected Products
**Unisoc (Shanghai) Technologies Co., Ltd. - SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000**
Affected versions:
- Android10/Android11/Android12/Android13 (Status: affected)
### References
1. [](https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-6041, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-6041 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-6041
- **State**: PUBLISHED
- **Published Date**: September 25, 2018 at 14:00 UTC
- **Last Updated**: August 05, 2024 at 05:54 UTC
- **Reserved Date**: January 23, 2018 at 00:00 UTC
- **Assigned By**: Chrome
### Vulnerability Description
Incorrect security UI in navigation in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
### Affected Products
**Google - Chrome**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://chromereleases.googleblog.com/2018/01/stable-channel-update-for-desktop_24.html)
2. [DSA-4103](https://www.debian.org/security/2018/dsa-4103)
3. [102797](http://www.securityfocus.com/bid/102797)
4. [1040282](http://www.securitytracker.com/id/1040282)
5. [RHSA-2018:0265](https://access.redhat.com/errata/RHSA-2018:0265)
6. [](https://crbug.com/760342) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-6530, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-6530 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-6530
- **State**: PUBLISHED
- **Published Date**: October 10, 2024 at 12:02 UTC
- **Last Updated**: October 10, 2024 at 13:32 UTC
- **Reserved Date**: July 05, 2024 at 13:01 UTC
- **Assigned By**: GitLab
### Vulnerability Description
A cross-site scripting issue has been discovered in GitLab affecting all versions starting from 17.1 prior 17.2.9, starting from 17.3 prior to 17.3.5, and starting from 17.4 prior to 17.4.2. When adding a authorizing an application, it can be made to render as HTML under specific circumstances.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**GitLab - GitLab**
Affected versions:
- 17.1 (Status: affected)
- 17.3 (Status: affected)
- 17.4 (Status: affected)
### References
1. [GitLab Issue #471049](https://gitlab.com/gitlab-org/gitlab/-/issues/471049)
2. [HackerOne Bug Bounty Report #2567533](https://hackerone.com/reports/2567533)
### Credits
- Thanks [joaxcar](https://hackerone.com/joaxcar) for reporting this vulnerability through our HackerOne bug bounty program |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-2412, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-2412 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-2412
- **State**: PUBLISHED
- **Published Date**: June 18, 2013 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 15:36 UTC
- **Reserved Date**: March 05, 2013 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Serviceability. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to insufficient indication of an SSL connection failure by JConsole, related to RMI connection dialog box.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2013:1060](http://rhn.redhat.com/errata/RHSA-2013-1060.html)
2. [HPSBUX02908](http://marc.info/?l=bugtraq&m=137545592101387&w=2)
3. [RHSA-2014:0414](https://access.redhat.com/errata/RHSA-2014:0414)
4. [GLSA-201406-32](http://security.gentoo.org/glsa/glsa-201406-32.xml)
5. [60618](http://www.securityfocus.com/bid/60618)
6. [](http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html)
7. [SUSE-SU-2013:1257](http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html)
8. [](https://bugzilla.redhat.com/show_bug.cgi?id=975144)
9. [oval:org.mitre.oval:def:19375](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19375)
10. [HPSBUX02907](http://marc.info/?l=bugtraq&m=137545505800971&w=2)
11. [54154](http://secunia.com/advisories/54154)
12. [RHSA-2013:1455](http://rhn.redhat.com/errata/RHSA-2013-1455.html)
13. [](http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/3927a18bbcbf)
14. [RHSA-2013:1059](http://rhn.redhat.com/errata/RHSA-2013-1059.html)
15. [TA13-169A](http://www.us-cert.gov/ncas/alerts/TA13-169A)
16. [](http://advisories.mageia.org/MGASA-2013-0185.html)
17. [RHSA-2013:0963](http://rhn.redhat.com/errata/RHSA-2013-0963.html)
18. [SUSE-SU-2013:1255](http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html)
19. [RHSA-2013:1456](http://rhn.redhat.com/errata/RHSA-2013-1456.html)
20. [oval:org.mitre.oval:def:19633](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19633)
21. [MDVSA-2013:183](http://www.mandriva.com/security/advisories?name=MDVSA-2013:183)
22. [](http://www-01.ibm.com/support/docview.wss?uid=swg21642336)
23. [SUSE-SU-2013:1305](http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html)
24. [oval:org.mitre.oval:def:17098](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17098) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-27783, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-27783 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-27783
- **State**: PUBLISHED
- **Published Date**: May 25, 2022 at 15:20 UTC
- **Last Updated**: September 16, 2024 at 23:41 UTC
- **Reserved Date**: February 26, 2021 at 00:00 UTC
- **Assigned By**: HCL
### Vulnerability Description
User generated PPKG file for Bulk Enroll may have unencrypted sensitive information exposed.
### CVSS Metrics
- **CVSS Base Score**: 6.8/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L`
### Weakness Classification (CWE)
- CWE-311: Security Weakness
### Affected Products
**HCL Software - HCL BigFix Mobile / Modern Client Management**
Affected versions:
- 2.0, 2.1 (Status: affected)
### References
1. [](https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0098586) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-57510, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-57510 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-57510
- **State**: PUBLISHED
- **Published Date**: January 29, 2025 at 00:00 UTC
- **Last Updated**: February 03, 2025 at 18:20 UTC
- **Reserved Date**: January 09, 2025 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Buffer Overflow vulnerability in Bento4 mp42avc v.3bdc891602d19789b8e8626e4a3e613a937b4d35 allows a local attacker to execute arbitrary code via the AP4_MemoryByteStream::WritePartial.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/axiomatic-systems/Bento4/issues/989)
2. [](https://gist.github.com/G2FUZZ/91a1cc3b8f2b0720e984353d59023b24) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-2687, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-2687 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-2687
- **State**: PUBLISHED
- **Published Date**: May 24, 2007 at 01:29 UTC
- **Last Updated**: August 07, 2024 at 13:49 UTC
- **Reserved Date**: May 15, 2007 at 00:00 UTC
- **Assigned By**: flexera
### Vulnerability Description
Stack-based buffer overflow in the MicroWorld Agent service (MWAGENT.EXE) in MicroWorld Technologies eScan before 9.0.718.1 allows remote attackers to execute arbitrary code via a long command.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [escan-mwagent-bo(34457)](https://exchange.xforce.ibmcloud.com/vulnerabilities/34457)
2. [20070523 Secunia Research: eScan Products Agent Service Command DecryptionBuffer Overflow](http://www.securityfocus.com/archive/1/469347/100/0/threaded)
3. [](http://secunia.com/secunia_research/2007-54/advisory/)
4. [ADV-2007-1917](http://www.vupen.com/english/advisories/2007/1917)
5. [24112](http://www.securityfocus.com/bid/24112)
6. [36580](http://osvdb.org/36580)
7. [25136](http://secunia.com/advisories/25136) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-15230, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-15230 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-15230
- **State**: PUBLISHED
- **Published Date**: August 28, 2019 at 16:32 UTC
- **Last Updated**: August 05, 2024 at 00:42 UTC
- **Reserved Date**: August 19, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
LibreNMS v1.54 has XSS in the Create User, Inventory, Add Device, Notifications, Alert Rule, Create Maintenance, and Alert Template sections of the admin console. This could lead to cookie stealing and other malicious actions. This vulnerability can be exploited with an authenticated account.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.sevenlayers.com/index.php/239-librenms-v1-54-xss) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-24807, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-24807 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-24807
- **State**: PUBLISHED
- **Published Date**: October 06, 2020 at 17:10 UTC
- **Last Updated**: August 04, 2024 at 15:19 UTC
- **Reserved Date**: August 28, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The socket.io-file package through 2.0.31 for Node.js relies on client-side validation of file types, which allows remote attackers to execute arbitrary code by uploading an executable file via a modified JSON name field. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.npmjs.com/package/socket.io-file)
2. [](https://github.com/rico345100/socket.io-file)
3. [](https://www.npmjs.com/advisories/1564)
4. [](https://github.com/advisories/GHSA-6495-8jvh-f28x) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-26891, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-26891 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-26891
- **State**: PUBLISHED
- **Published Date**: March 11, 2021 at 15:42 UTC
- **Last Updated**: August 03, 2024 at 20:33 UTC
- **Reserved Date**: February 08, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Container Execution Agent Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server, version 1909 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
### References
1. [](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26891) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-41555, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-41555 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-41555
- **State**: PUBLISHED
- **Published Date**: October 05, 2021 at 14:58 UTC
- **Last Updated**: August 04, 2024 at 03:15 UTC
- **Reserved Date**: September 22, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In ARCHIBUS Web Central 21.3.3.815 (a version from 2014), XSS occurs in /archibus/dwr/call/plaincall/workflow.runWorkflowRule.dwr because the data received as input from clients is re-included within the HTTP response returned by the application without adequate validation. In this way, if HTML code or client-side executable code (e.g., Javascript) is entered as input, the expected execution flow could be altered. This is fixed in all recent versions, such as version 26. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. Version 21.3 was officially de-supported by the end of 2020
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.gruppotim.it/redteam) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-1653, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-1653 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-1653
- **State**: PUBLISHED
- **Published Date**: January 12, 2021 at 19:42 UTC
- **Last Updated**: October 08, 2024 at 16:17 UTC
- **Reserved Date**: December 02, 2020 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows CSC Service Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Windows 10 Version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 20H2**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1803**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1809**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2019 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1909**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server, version 1909 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server version 2004**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1507**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 10 Version 1607**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows Server 2016 (Server Core installation)**
Affected versions:
- 10.0.0 (Status: affected)
**Microsoft - Windows 7**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 7 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows 8.1**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2 (Server Core installation)**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 Service Pack 2**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1**
Affected versions:
- 6.1.0 (Status: affected)
**Microsoft - Windows Server 2008 R2 Service Pack 1 (Server Core installation)**
Affected versions:
- 6.0.0 (Status: affected)
**Microsoft - Windows Server 2012**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 (Server Core installation)**
Affected versions:
- 6.2.0 (Status: affected)
**Microsoft - Windows Server 2012 R2**
Affected versions:
- 6.3.0 (Status: affected)
**Microsoft - Windows Server 2012 R2 (Server Core installation)**
Affected versions:
- 6.3.0 (Status: affected)
### References
1. [Windows CSC Service Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1653) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-5771, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-5771 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-5771
- **State**: PUBLISHED
- **Published Date**: August 07, 2016 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 01:15 UTC
- **Reserved Date**: June 23, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
spl_array.c in the SPL extension in PHP before 5.5.37 and 5.6.x before 5.6.23 improperly interacts with the unserialize implementation and garbage collection, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and application crash) via crafted serialized data.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://github.com/php/php-src/commit/3f627e580acfdaf0595ae3b115b8bec677f203ee?w=1)
2. [APPLE-SA-2016-09-20](http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html)
3. [openSUSE-SU-2016:1761](http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html)
4. [openSUSE-SU-2016:1922](http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html)
5. [RHSA-2016:2750](http://rhn.redhat.com/errata/RHSA-2016-2750.html)
6. [](https://bugs.php.net/bug.php?id=72433)
7. [](http://php.net/ChangeLog-5.php)
8. [[oss-security] 20160623 Re: CVE for PHP 5.5.37 issues](http://www.openwall.com/lists/oss-security/2016/06/23/4)
9. [DSA-3618](http://www.debian.org/security/2016/dsa-3618)
10. [91401](http://www.securityfocus.com/bid/91401)
11. [](https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731)
12. [](https://support.apple.com/HT207170) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-4733, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-4733 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-4733
- **State**: PUBLISHED
- **Published Date**: January 08, 2021 at 20:40 UTC
- **Last Updated**: September 17, 2024 at 00:25 UTC
- **Reserved Date**: December 30, 2019 at 00:00 UTC
- **Assigned By**: ibm
### Vulnerability Description
IBM Jazz Foundation products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 188127.
### Affected Products
**IBM - Rational Collaborative Lifecycle Management**
Affected versions:
- 6.0.2 (Status: affected)
- 6.0.6 (Status: affected)
- 6.0.6.1 (Status: affected)
**IBM - Engineering Workflow Management**
Affected versions:
- 7.0 (Status: affected)
- 7.0.1 (Status: affected)
**IBM - Engineering Test Management**
Affected versions:
- 7.0.0 (Status: affected)
**IBM - Rational Engineering Lifecycle Manager**
Affected versions:
- 6.0.2 (Status: affected)
- 6.0.6 (Status: affected)
- 6.0.6.1 (Status: affected)
- 7.0 (Status: affected)
- 7.0.1 (Status: affected)
**IBM - Rational Quality Manager**
Affected versions:
- 6.0.2 (Status: affected)
- 6.0.6 (Status: affected)
- 6.0.6.1 (Status: affected)
**IBM - Engineering Lifecycle Optimization**
Affected versions:
- 7.0 (Status: affected)
- 7.0.1 (Status: affected)
**IBM - Rational DOORS Next Generation**
Affected versions:
- 6.0.2 (Status: affected)
- 6.0.6 (Status: affected)
- 6.0.6.1 (Status: affected)
- 7.0 (Status: affected)
- 7.0.1 (Status: affected)
**IBM - Rational Rhapsody Model Manager**
Affected versions:
- 6.0.6 (Status: affected)
- 6.0.6.1 (Status: affected)
- 7.0 (Status: affected)
- 7.0.1 (Status: affected)
- 6.0.2 (Status: affected)
**IBM - Rational Rhapsody Design Manager**
Affected versions:
- 6.0.2 (Status: affected)
- 6.0.6 (Status: affected)
- 6.0.6.1 (Status: affected)
- 7.0 (Status: affected)
- 7.0.1 (Status: affected)
**IBM - Rational Team Concert**
Affected versions:
- 6.0.2 (Status: affected)
- 6.0.6 (Status: affected)
- 6.0.6.1 (Status: affected)
### References
1. [](https://www.ibm.com/support/pages/node/6398742)
2. [ibm-jazz-cve20204733-xss (188127)](https://exchange.xforce.ibmcloud.com/vulnerabilities/188127) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.